Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1511209
MD5:c0feb087f1cfa85fdb001e059f4c95c7
SHA1:1d9ab2eb37f85bea36f3e6ded442154181c96964
SHA256:38957fb3708884f1a8befb0c17b0fa81f57005a5de058772cc12bf357c548eab
Tags:exe
Infos:

Detection

44Caliber Stealer, BlackGuard, Rags Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected 44Caliber Stealer
Yara detected BlackGuard
Yara detected Rags Stealer
AI detected suspicious sample
Contains functionality to capture screen (.Net source)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Loader.exe (PID: 1732 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: C0FEB087F1CFA85FDB001E059F4C95C7)
  • cleanup
{"Discord Webhook": "https://discord.com/api/webhooks/1280107935317495880/Q8mmvXU6Bc1Q-R-2e0aAMsbedaMqyt0txCOBc8XSsTRNeUIepUtoX2DE4a6MxP9SzEFB\u0001Scam1"}
SourceRuleDescriptionAuthorStrings
Loader.exeJoeSecurity_BlackGuardYara detected BlackGuardJoe Security
    Loader.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Loader.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        Loader.exeJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
          Loader.exeJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            00000000.00000002.1737602637.000001FD8829E000.00000004.00000800.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
            • 0xc4:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
            • 0x7fc:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
            00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_BlackGuardYara detected BlackGuardJoe Security
              00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
                  00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
                    Click to see the 6 entries
                    SourceRuleDescriptionAuthorStrings
                    0.0.Loader.exe.1fd86360000.0.unpackJoeSecurity_BlackGuardYara detected BlackGuardJoe Security
                      0.0.Loader.exe.1fd86360000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                        0.0.Loader.exe.1fd86360000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                          0.0.Loader.exe.1fd86360000.0.unpackJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
                            0.0.Loader.exe.1fd86360000.0.unpackJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
                              Click to see the 3 entries
                              No Sigma rule has matched
                              No Suricata rule has matched

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: Loader.exeAvira: detected
                              Source: 0.0.Loader.exe.1fd86360000.0.unpackMalware Configuration Extractor: 44Caliber Stealer {"Discord Webhook": "https://discord.com/api/webhooks/1280107935317495880/Q8mmvXU6Bc1Q-R-2e0aAMsbedaMqyt0txCOBc8XSsTRNeUIepUtoX2DE4a6MxP9SzEFB\u0001Scam1"}
                              Source: Loader.exeVirustotal: Detection: 78%Perma Link
                              Source: Loader.exeReversingLabs: Detection: 78%
                              Source: Yara matchFile source: Loader.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                              Source: Loader.exeJoe Sandbox ML: detected

                              Location Tracking

                              barindex
                              Source: unknownDNS query: name: freegeoip.app
                              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49730 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 104.21.85.189:443 -> 192.168.2.4:49731 version: TLS 1.2
                              Source: Loader.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Source: Binary string: mscorlib.pdb source: Loader.exe, 00000000.00000002.1737602637.000001FD881C1000.00000004.00000800.00020000.00000000.sdmp
                              Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: Loader.exe, 00000000.00000002.1737602637.000001FD882FD000.00000004.00000800.00020000.00000000.sdmp
                              Source: Binary string: \44CALIBER\obj\Release\Insidious.pdb source: Loader.exe
                              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb5 source: Loader.exe, 00000000.00000002.1742501745.000001FDA089A000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: System.pdb source: Loader.exe, 00000000.00000002.1737602637.000001FD882FD000.00000004.00000800.00020000.00000000.sdmp

                              Networking

                              barindex
                              Source: Yara matchFile source: Loader.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPE
                              Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: freegeoip.appConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: ipbase.comConnection: Keep-Alive
                              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                              Source: Joe Sandbox ViewIP Address: 104.21.85.189 104.21.85.189
                              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: freegeoip.appConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: ipbase.comConnection: Keep-Alive
                              Source: global trafficDNS traffic detected: DNS query: freegeoip.app
                              Source: global trafficDNS traffic detected: DNS query: ipbase.com
                              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 Sep 2024 10:39:01 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeAge: 10899Cache-Control: public,max-age=0,must-revalidateCache-Status: "Netlify Edge"; hitVary: Accept-EncodingX-Nf-Request-Id: 01J7R1TPV31H16NKRFQCHVFQ90CF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5XuBdYnjcdt7DU%2FpomCHXBqMINcKqwIyis2qQ8xm5Zm0SDCbto%2BOdbVSZkkfUdt4WTiZwkFWq75e4lJpZnZL%2B5pvjgJlLSwVFKhoEWm83olY5nT6uOZzDwk%2Bk7GJ"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8c2fc0321f1b8c57-EWRalt-svc: h3=":443"; ma=86400
                              Source: cert9.db.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                              Source: cert9.db.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                              Source: cert9.db.0.drString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                              Source: cert9.db.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                              Source: cert9.db.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                              Source: cert9.db.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                              Source: cert9.db.0.drString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                              Source: Loader.exe, 00000000.00000002.1737602637.000001FD8820D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.app
                              Source: Loader.exe, 00000000.00000002.1737602637.000001FD8827D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipbase.com
                              Source: cert9.db.0.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: cert9.db.0.drString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                              Source: Loader.exe, 00000000.00000002.1737602637.000001FD883B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: cert9.db.0.drString found in binary or memory: http://x1.c.lencr.org/0
                              Source: cert9.db.0.drString found in binary or memory: http://x1.i.lencr.org/0
                              Source: Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                              Source: Loader.exe, 00000000.00000002.1737602637.000001FD8825E000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000000.00000002.1737602637.000001FD882FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125
                              Source: Loader.exe, 00000000.00000002.1737602637.000001FD881C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.vimeworld.ru/user/name/
                              Source: Loader.exeString found in binary or memory: https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/
                              Source: Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                              Source: Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                              Source: Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                              Source: Loader.exeString found in binary or memory: https://discord.com/api/webhooks/1280107935317495880/Q8mmvXU6Bc1Q-R-2e0aAMsbedaMqyt0txCOBc8XSsTRNeUI
                              Source: Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                              Source: Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                              Source: Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                              Source: Loader.exe, 00000000.00000002.1737602637.000001FD882FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Roboto:400
                              Source: Loader.exe, 00000000.00000002.1737602637.000001FD881C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app
                              Source: Loader.exe, 00000000.00000002.1737602637.000001FD881C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/
                              Source: Loader.exe, 00000000.00000002.1737602637.000001FD88266000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipbase.com
                              Source: Loader.exe, 00000000.00000002.1737602637.000001FD88262000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000000.00000002.1737602637.000001FD88266000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000000.00000002.1737602637.000001FD8820D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipbase.com/xml/
                              Source: Loader.exeString found in binary or memory: https://steamcommunity.com/profiles/ASOFTWARE
                              Source: tmp8681.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org
                              Source: tmp8681.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                              Source: tmp8681.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
                              Source: Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drString found in binary or memory: https://www.ecosia.org/newtab/
                              Source: Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                              Source: tmp8681.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org
                              Source: tmp8681.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                              Source: tmp8681.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                              Source: Loader.exe, 00000000.00000002.1741476843.000001FD9826B000.00000004.00000800.00020000.00000000.sdmp, tmp8681.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                              Source: tmp8681.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                              Source: Loader.exe, 00000000.00000002.1741476843.000001FD9826B000.00000004.00000800.00020000.00000000.sdmp, tmp8681.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49730 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 104.21.85.189:443 -> 192.168.2.4:49731 version: TLS 1.2

                              Key, Mouse, Clipboard, Microphone and Screen Capturing

                              barindex
                              Source: Loader.exe, Screen.cs.Net Code: GetScreen

                              E-Banking Fraud

                              barindex
                              Source: Yara matchFile source: Loader.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY

                              System Summary

                              barindex
                              Source: Loader.exe, type: SAMPLEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: Loader.exe, type: SAMPLEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                              Source: Loader.exe, type: SAMPLEMatched rule: Detects A310Logger Author: ditekSHen
                              Source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                              Source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPEMatched rule: Detects A310Logger Author: ditekSHen
                              Source: 00000000.00000002.1737602637.000001FD8829E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: Process Memory Space: Loader.exe PID: 1732, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7D47260_2_00007FFD9B7D4726
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7C14880_2_00007FFD9B7C1488
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7D54D20_2_00007FFD9B7D54D2
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7C14480_2_00007FFD9B7C1448
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7C13D30_2_00007FFD9B7C13D3
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7C573D0_2_00007FFD9B7C573D
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7C14A00_2_00007FFD9B7C14A0
                              Source: Loader.exe, 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameInsidious.exe6 vs Loader.exe
                              Source: Loader.exeBinary or memory string: OriginalFilenameInsidious.exe6 vs Loader.exe
                              Source: Loader.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: Loader.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                              Source: Loader.exe, type: SAMPLEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                              Source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                              Source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                              Source: 00000000.00000002.1737602637.000001FD8829E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: Process Memory Space: Loader.exe PID: 1732, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: Loader.exe, Help.csSuspicious URL: 'https://api.vimeworld.ru/user/name/'
                              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/14@2/2
                              Source: C:\Users\user\Desktop\Loader.exeFile created: C:\Users\Public\fqs92o4p.default-releaseJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeMutant created: NULL
                              Source: C:\Users\user\Desktop\Loader.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8681.tmpJump to behavior
                              Source: Loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: Loader.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ProcessorId FROM Win32_Processor
                              Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: tmp871F.tmp.dat.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                              Source: Loader.exeVirustotal: Detection: 78%
                              Source: Loader.exeReversingLabs: Detection: 78%
                              Source: C:\Users\user\Desktop\Loader.exeFile read: C:\Users\user\Desktop\Loader.exeJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: rasapi32.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: rasman.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: rtutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: winhttp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: secur32.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: schannel.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: mskeyprotect.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncryptsslp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: wbemcomn.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
                              Source: Loader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                              Source: Loader.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Source: Loader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Binary string: mscorlib.pdb source: Loader.exe, 00000000.00000002.1737602637.000001FD881C1000.00000004.00000800.00020000.00000000.sdmp
                              Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: Loader.exe, 00000000.00000002.1737602637.000001FD882FD000.00000004.00000800.00020000.00000000.sdmp
                              Source: Binary string: \44CALIBER\obj\Release\Insidious.pdb source: Loader.exe
                              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb5 source: Loader.exe, 00000000.00000002.1742501745.000001FDA089A000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: System.pdb source: Loader.exe, 00000000.00000002.1737602637.000001FD882FD000.00000004.00000800.00020000.00000000.sdmp
                              Source: Loader.exeStatic PE information: 0xC5F44CBF [Fri Mar 29 21:53:03 2075 UTC]
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7C1488 push esp; retn 4810h0_2_00007FFD9B7C16C6
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7C021D push E95DBA98h; ret 0_2_00007FFD9B7C0259
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7C6105 pushad ; ret 0_2_00007FFD9B7C61CD
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7C00BD pushad ; iretd 0_2_00007FFD9B7C00C1
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7C9D9A push eax; ret 0_2_00007FFD9B7C9E7D
                              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFD9B7C9D10 push eax; ret 0_2_00007FFD9B7C9E7D
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                              Malware Analysis System Evasion

                              barindex
                              Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 1FD866D0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 1FDA01C0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 600000Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599875Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599750Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599641Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599527Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599422Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599289Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599141Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599031Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598922Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598813Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598703Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598594Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598469Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598360Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598235Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598110Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeWindow / User API: threadDelayed 2902Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -600000s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -599875s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1260Thread sleep count: 277 > 30Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1260Thread sleep count: 2902 > 30Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -599750s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -599641s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -599527s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -599422s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -599289s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -599141s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -599031s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -598922s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -598813s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -598703s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -598594s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -598469s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -598360s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -598235s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 1272Thread sleep time: -598110s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 5700Thread sleep time: -30000s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exe TID: 980Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
                              Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ProcessorId FROM Win32_Processor
                              Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 600000Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599875Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599750Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599641Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599527Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599422Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599289Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599141Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 599031Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598922Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598813Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598703Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598594Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598469Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598360Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598235Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 598110Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: Loader.exe, 00000000.00000002.1742501745.000001FDA089A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: C:\Users\user\Desktop\Loader.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: page read and write | page guardJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\Users\user\Desktop\Loader.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                              Stealing of Sensitive Information

                              barindex
                              Source: Yara matchFile source: Loader.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 1732, type: MEMORYSTR
                              Source: Yara matchFile source: Loader.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Loader.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1737602637.000001FD881F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 1732, type: MEMORYSTR
                              Source: Loader.exe, 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Electrum
                              Source: Loader.exe, 00000000.00000002.1737602637.000001FD88337000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 1C:\Users\user\AppData\Roaming\Electrum\wallets\*
                              Source: Loader.exe, 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: JaxxDir
                              Source: Loader.exe, 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: Loader.exe, 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: Loader.exe, 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: ExodusDir
                              Source: Loader.exe, 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum
                              Source: Loader.exe, 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: Loader.exe, 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\Jump to behavior
                              Source: Yara matchFile source: Loader.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 1732, type: MEMORYSTR

                              Remote Access Functionality

                              barindex
                              Source: Yara matchFile source: Loader.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 1732, type: MEMORYSTR
                              Source: Yara matchFile source: Loader.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Loader.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Loader.exe.1fd86360000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1737602637.000001FD881F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 1732, type: MEMORYSTR
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                              Windows Management Instrumentation
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              1
                              Masquerading
                              1
                              OS Credential Dumping
                              121
                              Security Software Discovery
                              Remote Services1
                              Screen Capture
                              11
                              Encrypted Channel
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                              Disable or Modify Tools
                              LSASS Memory1
                              Process Discovery
                              Remote Desktop Protocol1
                              Archive Collected Data
                              3
                              Ingress Tool Transfer
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)151
                              Virtualization/Sandbox Evasion
                              Security Account Manager151
                              Virtualization/Sandbox Evasion
                              SMB/Windows Admin Shares3
                              Data from Local System
                              3
                              Non-Application Layer Protocol
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                              Obfuscated Files or Information
                              NTDS1
                              Application Window Discovery
                              Distributed Component Object ModelInput Capture4
                              Application Layer Protocol
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                              Timestomp
                              LSA Secrets33
                              System Information Discovery
                              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                              DLL Side-Loading
                              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              Loader.exe79%VirustotalBrowse
                              Loader.exe79%ReversingLabsByteCode-MSIL.Trojan.A310Logger
                              Loader.exe100%AviraHEUR/AGEN.1307065
                              Loader.exe100%Joe Sandbox ML
                              No Antivirus matches
                              No Antivirus matches
                              SourceDetectionScannerLabelLink
                              ipbase.com0%VirustotalBrowse
                              freegeoip.app0%VirustotalBrowse
                              SourceDetectionScannerLabelLink
                              https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                              https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                              https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                              https://www.ecosia.org/newtab/0%URL Reputationsafe
                              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                              https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                              https://support.mozilla.org0%URL Reputationsafe
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                              https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF0%Avira URL Cloudsafe
                              https://steamcommunity.com/profiles/ASOFTWARE0%Avira URL Cloudsafe
                              https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                              https://freegeoip.app/xml/0%Avira URL Cloudsafe
                              https://discord.com/api/webhooks/1280107935317495880/Q8mmvXU6Bc1Q-R-2e0aAMsbedaMqyt0txCOBc8XSsTRNeUI0%Avira URL Cloudsafe
                              http://crl.rootca1.amazontrust.com/rootca1.crl00%Avira URL Cloudsafe
                              https://freegeoip.app0%Avira URL Cloudsafe
                              http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
                              https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/1250%Avira URL Cloudsafe
                              https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                              https://freegeoip.app0%VirustotalBrowse
                              http://ipbase.com0%Avira URL Cloudsafe
                              https://discord.com/api/webhooks/1280107935317495880/Q8mmvXU6Bc1Q-R-2e0aAMsbedaMqyt0txCOBc8XSsTRNeUI0%VirustotalBrowse
                              http://x1.c.lencr.org/00%Avira URL Cloudsafe
                              http://x1.i.lencr.org/00%Avira URL Cloudsafe
                              http://crt.rootca1.amazontrust.com/rootca1.cer0?0%Avira URL Cloudsafe
                              https://freegeoip.app/xml/1%VirustotalBrowse
                              http://ipbase.com0%VirustotalBrowse
                              http://x1.c.lencr.org/00%VirustotalBrowse
                              http://crl.rootca1.amazontrust.com/rootca1.crl00%VirustotalBrowse
                              https://ipbase.com/xml/0%Avira URL Cloudsafe
                              https://api.vimeworld.ru/user/name/0%Avira URL Cloudsafe
                              http://x1.i.lencr.org/00%VirustotalBrowse
                              https://steamcommunity.com/profiles/ASOFTWARE0%VirustotalBrowse
                              https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/1250%VirustotalBrowse
                              https://ipbase.com0%Avira URL Cloudsafe
                              https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/0%Avira URL Cloudsafe
                              http://freegeoip.app0%Avira URL Cloudsafe
                              http://crt.rootca1.amazontrust.com/rootca1.cer0?0%VirustotalBrowse
                              https://api.vimeworld.ru/user/name/0%VirustotalBrowse
                              https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/0%VirustotalBrowse
                              http://freegeoip.app0%VirustotalBrowse
                              https://ipbase.com/xml/0%VirustotalBrowse
                              https://ipbase.com0%VirustotalBrowse
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              ipbase.com
                              104.21.85.189
                              truefalseunknown
                              freegeoip.app
                              188.114.97.3
                              truetrueunknown
                              NameMaliciousAntivirus DetectionReputation
                              https://freegeoip.app/xml/false
                              • 1%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://ipbase.com/xml/false
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://duckduckgo.com/chrome_newtabLoader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDFtmp8681.tmp.tmpdb.0.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://duckduckgo.com/ac/?q=Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://www.google.com/images/branding/product/ico/googleg_lodp.icoLoader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://steamcommunity.com/profiles/ASOFTWARELoader.exefalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://discord.com/api/webhooks/1280107935317495880/Q8mmvXU6Bc1Q-R-2e0aAMsbedaMqyt0txCOBc8XSsTRNeUILoader.exetrue
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://freegeoip.appLoader.exe, 00000000.00000002.1737602637.000001FD881C1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://crl.rootca1.amazontrust.com/rootca1.crl0cert9.db.0.drfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://ocsp.rootca1.amazontrust.com0:cert9.db.0.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.ecosia.org/newtab/Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brtmp8681.tmp.tmpdb.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125Loader.exe, 00000000.00000002.1737602637.000001FD8825E000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000000.00000002.1737602637.000001FD882FD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://ac.ecosia.org/autocomplete?q=Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://ipbase.comLoader.exe, 00000000.00000002.1737602637.000001FD8827D000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://x1.c.lencr.org/0cert9.db.0.drfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://x1.i.lencr.org/0cert9.db.0.drfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLoader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://crt.rootca1.amazontrust.com/rootca1.cer0?cert9.db.0.drfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.vimeworld.ru/user/name/Loader.exe, 00000000.00000002.1737602637.000001FD881C1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/Loader.exefalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://support.mozilla.orgtmp8681.tmp.tmpdb.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameLoader.exe, 00000000.00000002.1737602637.000001FD883B1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Loader.exe, 00000000.00000002.1741476843.000001FD98249000.00000004.00000800.00020000.00000000.sdmp, tmp86A1.tmp.dat.0.dr, tmp8730.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://ipbase.comLoader.exe, 00000000.00000002.1737602637.000001FD88266000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://freegeoip.appLoader.exe, 00000000.00000002.1737602637.000001FD8820D000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              188.114.97.3
                              freegeoip.appEuropean Union
                              13335CLOUDFLARENETUStrue
                              104.21.85.189
                              ipbase.comUnited States
                              13335CLOUDFLARENETUSfalse
                              Joe Sandbox version:40.0.0 Tourmaline
                              Analysis ID:1511209
                              Start date and time:2024-09-14 12:38:04 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 2m 44s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:1
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Loader.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@1/14@2/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 97%
                              • Number of executed functions: 7
                              • Number of non-executed functions: 1
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Stop behavior analysis, all processes terminated
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              TimeTypeDescription
                              06:38:59API Interceptor18x Sleep call for process: Loader.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              188.114.97.3http://infofunctionboard.autos/Get hashmaliciousUnknownBrowse
                              • infofunctionboard.autos/check-online
                              https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp/link.sbstck.com/redirect/9f1a559b-1924-42a1-ac63-d801d0b621e3?j=eyJ1IjoiNGQydGxqIn0.nUqvCKS4pzEN7oIgjX67rfaG_zpqbsbEevJ7SYpXFUgGet hashmaliciousHTMLPhisherBrowse
                              • link.sbstck.com/redirect/9f1a559b-1924-42a1-ac63-d801d0b621e3
                              QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • filetransfer.io/data-package/lPrdr8CZ/download
                              Purchase order.exeGet hashmaliciousFormBookBrowse
                              • www.x0x9x8x8x7x6.shop/assb/
                              http://aivx.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                              • aivx.pages.dev/favicon.ico
                              Comprobante.PDF867564575869708776565434576897.exeGet hashmaliciousLokibotBrowse
                              • touxzw.ir/sweetwhore/five/fre.php
                              DOC092024-0431202229487.exeGet hashmaliciousFormBookBrowse
                              • www.rtpngk.xyz/altr/
                              Remittance advice.exeGet hashmaliciousFormBookBrowse
                              • www.1win-moldovia.fun/kslt/
                              SecuriteInfo.com.FileRepMalware.20092.26363.exeGet hashmaliciousUnknownBrowse
                              • 13213edsewrwrfw.okis.ru/
                              EGCS-875-S5-SMO M2A.exeGet hashmaliciousFormBookBrowse
                              • www.serverplay.live/bm51/
                              104.21.85.189Nursultan.exeGet hashmalicious44Caliber Stealer, BlackGuard, Blank Grabber, Rags Stealer, Umbral Stealer, XWormBrowse
                                Pots.exeGet hashmalicious44userber Stealer, Rags StealerBrowse
                                  aurora-live-20240221.exeGet hashmaliciousUnknownBrowse
                                    dudick SystemDesk Important Crediential Notification 1.emlGet hashmaliciousHTMLPhisherBrowse
                                      64drop.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                        123.scr.exeGet hashmaliciousUnknownBrowse
                                          RP.sfx.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                            i6R4NsEd8t.exeGet hashmaliciousSnake KeyloggerBrowse
                                              rvYr7FRwkG.dllGet hashmaliciousUnknownBrowse
                                                case (426).xlsGet hashmaliciousUnknownBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  freegeoip.appNursultan.exeGet hashmalicious44Caliber Stealer, BlackGuard, Blank Grabber, Rags Stealer, Umbral Stealer, XWormBrowse
                                                  • 188.114.97.3
                                                  External.exeGet hashmaliciousAdes Stealer, BlackGuard, VEGA StealerBrowse
                                                  • 188.114.96.3
                                                  Insidious_protected.exeGet hashmalicious44Caliber Stealer, BlackGuard, Rags StealerBrowse
                                                  • 188.114.96.3
                                                  nyen2eabmfb.exeGet hashmalicious44Caliber Stealer, BlackGuard, Rags StealerBrowse
                                                  • 188.114.97.3
                                                  Cheat.exeGet hashmalicious44Caliber Stealer, BlackGuard, Rags StealerBrowse
                                                  • 188.114.97.3
                                                  B5U2ccQ8H1.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                                  • 188.114.97.3
                                                  xj40xovMsm.exeGet hashmaliciousAsyncRAT, AveMaria, Keyzetsu Clipper, MicroClip, PureLog Stealer, RL STEALER, RedLineBrowse
                                                  • 188.114.96.3
                                                  Pots.exeGet hashmalicious44userber Stealer, Rags StealerBrowse
                                                  • 104.21.73.97
                                                  qdHMT36Tn9.exeGet hashmalicious44Caliber Stealer, Njrat, Rags StealerBrowse
                                                  • 172.67.160.84
                                                  64drop.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                  • 104.21.73.97
                                                  ipbase.comNursultan.exeGet hashmalicious44Caliber Stealer, BlackGuard, Blank Grabber, Rags Stealer, Umbral Stealer, XWormBrowse
                                                  • 104.21.85.189
                                                  External.exeGet hashmaliciousAdes Stealer, BlackGuard, VEGA StealerBrowse
                                                  • 172.67.209.71
                                                  xj40xovMsm.exeGet hashmaliciousAsyncRAT, AveMaria, Keyzetsu Clipper, MicroClip, PureLog Stealer, RL STEALER, RedLineBrowse
                                                  • 172.67.209.71
                                                  Pots.exeGet hashmalicious44userber Stealer, Rags StealerBrowse
                                                  • 104.21.85.189
                                                  qdHMT36Tn9.exeGet hashmalicious44Caliber Stealer, Njrat, Rags StealerBrowse
                                                  • 172.67.209.71
                                                  64drop.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                  • 104.21.85.189
                                                  123.scr.exeGet hashmaliciousUnknownBrowse
                                                  • 104.21.85.189
                                                  123.scr.exeGet hashmaliciousRags StealerBrowse
                                                  • 172.67.209.71
                                                  123.scr.exeGet hashmaliciousRags StealerBrowse
                                                  • 172.67.209.71
                                                  RP.sfx.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                  • 104.21.85.189
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CLOUDFLARENETUSsntmr.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                  • 172.67.136.135
                                                  setup3.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, SmokeLoaderBrowse
                                                  • 172.67.136.135
                                                  vfdjg.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                  • 172.67.136.135
                                                  https://os50-card.ru/50Get hashmaliciousUnknownBrowse
                                                  • 104.17.25.14
                                                  66e40b2e8a52e_lfsdj.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.38.33
                                                  app__v6.20.5_.msiGet hashmaliciousUnknownBrowse
                                                  • 188.114.96.3
                                                  Setup.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.97.3
                                                  WorldWars Setup.exeGet hashmaliciousUnknownBrowse
                                                  • 172.64.41.3
                                                  client.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                  • 172.67.196.114
                                                  https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%7A%6F%71%7A%71%2E%6F%72%67%2F%61%74%74%2F%61%74%74%2FLZH2gvcseOdSTVo1rdoVRIuO/amZhbGNrZUBraWxjb3lnbG9iYWxmb29kcy5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                  • 104.21.78.226
                                                  CLOUDFLARENETUSsntmr.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                  • 172.67.136.135
                                                  setup3.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, SmokeLoaderBrowse
                                                  • 172.67.136.135
                                                  vfdjg.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                  • 172.67.136.135
                                                  https://os50-card.ru/50Get hashmaliciousUnknownBrowse
                                                  • 104.17.25.14
                                                  66e40b2e8a52e_lfsdj.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.38.33
                                                  app__v6.20.5_.msiGet hashmaliciousUnknownBrowse
                                                  • 188.114.96.3
                                                  Setup.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.97.3
                                                  WorldWars Setup.exeGet hashmaliciousUnknownBrowse
                                                  • 172.64.41.3
                                                  client.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                  • 172.67.196.114
                                                  https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%7A%6F%71%7A%71%2E%6F%72%67%2F%61%74%74%2F%61%74%74%2FLZH2gvcseOdSTVo1rdoVRIuO/amZhbGNrZUBraWxjb3lnbG9iYWxmb29kcy5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                  • 104.21.78.226
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  3b5074b1b5d032e5620f69f9f700ff0ehttps://os50-card.ru/50Get hashmaliciousUnknownBrowse
                                                  • 188.114.97.3
                                                  • 104.21.85.189
                                                  WIN CHANGER 2.3.exeGet hashmaliciousXWormBrowse
                                                  • 188.114.97.3
                                                  • 104.21.85.189
                                                  client.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                  • 188.114.97.3
                                                  • 104.21.85.189
                                                  https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%7A%6F%71%7A%71%2E%6F%72%67%2F%61%74%74%2F%61%74%74%2FLZH2gvcseOdSTVo1rdoVRIuO/amZhbGNrZUBraWxjb3lnbG9iYWxmb29kcy5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                  • 188.114.97.3
                                                  • 104.21.85.189
                                                  PO#005.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 188.114.97.3
                                                  • 104.21.85.189
                                                  https://procoinbaselogin.iwopop.com/Get hashmaliciousUnknownBrowse
                                                  • 188.114.97.3
                                                  • 104.21.85.189
                                                  http://hamouda0-t3-zabi.blogspot.com.es/Get hashmaliciousUnknownBrowse
                                                  • 188.114.97.3
                                                  • 104.21.85.189
                                                  http://metasamsk-uswallt.gitbook.io/Get hashmaliciousUnknownBrowse
                                                  • 188.114.97.3
                                                  • 104.21.85.189
                                                  http://bafybeieubbdk6tipjqxnm5i6qkoynxds3ers6m3oohr525ku4i4s5ccmz4.ipfs.dweb.link/Get hashmaliciousUnknownBrowse
                                                  • 188.114.97.3
                                                  • 104.21.85.189
                                                  https://ranjitkumarmehta1.github.io/netflix/Get hashmaliciousHTMLPhisherBrowse
                                                  • 188.114.97.3
                                                  • 104.21.85.189
                                                  No context
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):618
                                                  Entropy (8bit):4.078627837804452
                                                  Encrypted:false
                                                  SSDEEP:6:pYcCFWl4BjJUVcVIKwvkWQwSTelCpEu63rZu0Ghwa1B7VXatA67X:pYzdgWgXSTeMpa3lV2wUB7VKtA6r
                                                  MD5:A1C7C9118629F6C0825080AF4BE13B97
                                                  SHA1:31C6EE166D629F1B861D85A03620084C70B585F7
                                                  SHA-256:62C3F5BD94A2B2DA9925E5A4A8AFCBD9B9C4EA3921AAF8A600239F4C5E1CB571
                                                  SHA-512:D546F95790A2A30945905BEB3A025FB697E8904D4973AC1760315F4E50BFFEB2320CEE5DE2F0041945C3E665981290247075AD6EEDABD7D17276EED8096001E8
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: ==================================================. Operating system: Windows 10 Pro (64 Bit). PC user: 123716/user. ClipBoard: . Launch: C:\Users\user\Desktop\Loader.exe. ==================================================. Screen resolution: 1280x1024. Current time: 14/09/2024 09:08:47. HWID: 2B52705BB8. ==================================================. CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz. RAM: 4094MB. GPU: PFD5UB1AY. ==================================================. IP Geolocation: Fail Fail. Log Date: 09/14/2024 6:38. BSSID: 00:50:56:a7:21:15. ==================================================
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4117
                                                  Entropy (8bit):4.712395617489676
                                                  Encrypted:false
                                                  SSDEEP:96:rRljjDjO0jw7LrbzrSjtoghHjEjjjjjRHt2jLjjRSVjbmgfbrjjRRRjjtkrujjju:kfzOOtDZ0Z7
                                                  MD5:C398165130B10525EEBE9DD718244C38
                                                  SHA1:36C53CD289E8AA1A9AA4EF22629CAD5E893084D6
                                                  SHA-256:97B9545406DD5D618A00B2D3FE9C4CAFDF3D1CCB4328C84C699571449ED57CB2
                                                  SHA-512:BE5C4C4A203748D9B0EA9F5804D8891C389F3C923ECCB2B4C62FC82ACF66FD87337D836AF48104837FDC163DBD0A3AA7D000E4C34844E44E1D8358B587521536
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:NAME: qmyOKsemoVLVrQbNhKnKA..NAME: svchost..NAME: svchost..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: explorer..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: fontdrvhost..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: smartscreen..NAME: svchost..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: csrss..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: svchost..NAME: sihost..NAME: OfficeClickToRun..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: svchost..NAME: svchost..NAME: dasHost..NAME: svchost..NAME: ctfmon..NAME: RuntimeBroker..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: RuntimeBroker..NAME: RuntimeBroker..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: svchost..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: smss..NAME: svchost..NAME: svchost..NAME: WmiPrvSE..NAME: svchost..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: Loader..NAME: svchost..NAME: qmyOKsemoVLVrQbNhKnKA..NAME: dllhost..NAME: svchost..NAME: svchost..NAME: RuntimeBroker..NAME: StartMenuExperie
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):692300
                                                  Entropy (8bit):7.925039649975553
                                                  Encrypted:false
                                                  SSDEEP:12288:xy+SdWiSg3w5b4t/oLZPeUWS30E28u7xPD521l+1eVsg6cZR20o03cI4deRrG25h:U+SdhSlBKqVNWSkPJD52P6ho20oycIn9
                                                  MD5:C75ADF952FCD79F2AB2278123A958EB9
                                                  SHA1:AD5ABAC45F599CE014A66EFE1992BE2578FB2083
                                                  SHA-256:AB895FE9DA31127000CA9A19E676A150CB85180896609AA3FFD770099C739205
                                                  SHA-512:B569F2C40096964BD3842D1666E40900E4A83C31CE09C840FF87C2794A155413CECB2F3C5D474A02FCDDF6ADC5E261E48FFC37C8EDABF1FA5930BB1EE9D4A7ED
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..g.mWy...]'.w.{..../..{.\.o'....rj.$.3JH ..D...l0..0&.$...l....P....."..D2....\....w.]U.H..1.1.|.;.Z{Wa.<.k.Fg}..X.3.oO..YZ......w.....&kf.W.g...{..~k)..D....6...gd.5.._}G7z.7+.m..;/.W..._~c],."g.._.7..k...._]../...d.....^.v./..,..g...'...hF/..Xx.....m.....y_^..............s..0..[...Y....Y.v....2..e&.O..~...V.\.[.z..|n~...51~..O...'.....j&[....=O(..[..._....q.......r_.]x.'f...9...xe.#{...%....OT.....1.O...X.xK`..7-...'ly.M.......C..=..n......!7T..|}m..9...om.V.1{.O...=.p..v._.[J.5.e~.=[O+.......;...^Sq..k'......~j..AWw[.xU..l/...zM.m..5....SJ.,N..}....IWu....F'\Q..?..[.9..i..rm....(.6b%.v;y.?:.:.xK.g|....r=.....+.m'.}..o9...wye|..&..'_..x@..c.........^.....[._..K+..........a...Z.......+[./.-....Q>.........:6.....e.c>Ra..-..?..../.yqe.Q..cr.S.r.%.6...e.#....p.p.....r..b.C/...9....o.{..v.e..e......V.....rh.n..3O.3...<.|.%....w~7>..7
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 7, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                  Category:dropped
                                                  Size (bytes):229376
                                                  Entropy (8bit):0.64343788909108
                                                  Encrypted:false
                                                  SSDEEP:384:A1zkVmvQhyn+Zoz67dNlIMMz333JGN8j/LKXYj5kuv:AUUMXCyIr
                                                  MD5:B6787B79D64948AAC1D6359AC18AB268
                                                  SHA1:0831EB15AB2B330BE95975A24F8945ED284D0BA4
                                                  SHA-256:9D6FD3B8AB8AA7934C75EDE36CEB9CF4DDAD06C5031E89872B4E814D7DB674E2
                                                  SHA-512:9296866380EF966F1CB6E69B7B84D1A86CD5AE8D9A7332C57543875FAA4FC7F1387A4CF83B7D662E4BAB0381E4AFC9CB9999075EBB497C6756DF770454F3530E
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:SQLite format 3......@ ..........................................................................j......z..{...{.{j{*z.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
                                                  Category:dropped
                                                  Size (bytes):294912
                                                  Entropy (8bit):0.08436842005578409
                                                  Encrypted:false
                                                  SSDEEP:192:5va0zkVmvQhyn+Zoz679fqlQbGhMHPaVAL23vIn:51zkVmvQhyn+Zoz67n
                                                  MD5:2CD2840E30F477F23438B7C9D031FC08
                                                  SHA1:03D5410A814B298B068D62ACDF493B2A49370518
                                                  SHA-256:49F56AAA16086F2A9DB340CC9A6E8139E076765C1BFED18B1725CC3B395DC28D
                                                  SHA-512:DCDD722C3A8AD79265616ADDDCA208E068E4ECEBE8820E4ED16B1D1E07FD52EB3A59A22988450071CFDA50BBFF7CB005ADF05A843DA38421F28572F3433C0F19
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:SQLite format 3......@ ..........................................................................j......z<.{...{.{a{.z.z<z.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:CSV text
                                                  Category:dropped
                                                  Size (bytes):1498
                                                  Entropy (8bit):5.364175471524945
                                                  Encrypted:false
                                                  SSDEEP:24:ML9E4KQEAE4KKUNt1qE4GIsCKDE4KGKZI6KhPKIE4TKBGKoPE4K6sXE4Npv:MxHKQEAHKKkt1qHGIsCYHKGSI6oPtHTy
                                                  MD5:D70164A2669BAC5564AE9329650DB5AE
                                                  SHA1:D918ED8E2C94480B29A5FD1403F32C9555CADB60
                                                  SHA-256:1795A022ED26274E44D1C5FE93C7CEDD53D18378FA2DF5B6EF91408F234B8A95
                                                  SHA-512:82E357E433C1AFB7026A4E6D146743A0720C6E67062349CAC2795EC70A6B76B210F84A64CFEAB94D406AAA55D98A5BEAF5054FED9D0A322B66ED10BE15DAB9B5
                                                  Malicious:true
                                                  Reputation:low
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                  Category:dropped
                                                  Size (bytes):5242880
                                                  Entropy (8bit):0.037963276276857943
                                                  Encrypted:false
                                                  SSDEEP:192:58rJQaXoMXp0VW9FxWZWdgokBQNba9D3DO/JxW/QHI:58r54w0VW3xWZWdOBQFal3dQ
                                                  MD5:C0FDF21AE11A6D1FA1201D502614B622
                                                  SHA1:11724034A1CC915B061316A96E79E9DA6A00ADE8
                                                  SHA-256:FD4EB46C81D27A9B3669C0D249DF5CE2B49E5F37B42F917CA38AB8831121ADAC
                                                  SHA-512:A6147C196B033725018C7F28C1E75E20C2113A0C6D8172F5EABCB8FF334EA6CE10B758FFD1D22D50B4DB5A0A21BCC15294AC44E94D973F7A3EB9F8558F31769B
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                  Category:dropped
                                                  Size (bytes):106496
                                                  Entropy (8bit):1.1358696453229276
                                                  Encrypted:false
                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                  Malicious:false
                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                  Category:dropped
                                                  Size (bytes):40960
                                                  Entropy (8bit):0.8553638852307782
                                                  Encrypted:false
                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                  Malicious:false
                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                  Category:dropped
                                                  Size (bytes):106496
                                                  Entropy (8bit):1.1358696453229276
                                                  Encrypted:false
                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                  Malicious:false
                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                  Category:dropped
                                                  Size (bytes):98304
                                                  Entropy (8bit):0.08235737944063153
                                                  Encrypted:false
                                                  SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                  MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                  SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                  SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                  SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                  Malicious:false
                                                  Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                  Category:dropped
                                                  Size (bytes):114688
                                                  Entropy (8bit):0.9746603542602881
                                                  Encrypted:false
                                                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                  Malicious:false
                                                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                  Category:dropped
                                                  Size (bytes):114688
                                                  Entropy (8bit):0.9746603542602881
                                                  Encrypted:false
                                                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                  Malicious:false
                                                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Loader.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                  Category:dropped
                                                  Size (bytes):49152
                                                  Entropy (8bit):0.8180424350137764
                                                  Encrypted:false
                                                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                  MD5:349E6EB110E34A08924D92F6B334801D
                                                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                  Malicious:false
                                                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):5.857944963844179
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Windows Screen Saver (13104/52) 0.07%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  File name:Loader.exe
                                                  File size:280'576 bytes
                                                  MD5:c0feb087f1cfa85fdb001e059f4c95c7
                                                  SHA1:1d9ab2eb37f85bea36f3e6ded442154181c96964
                                                  SHA256:38957fb3708884f1a8befb0c17b0fa81f57005a5de058772cc12bf357c548eab
                                                  SHA512:99d641dcebec431d905b83ea89b5b5fadd5c029215345834b604aeca23d25d236bbbe65c2d3179ad9d7597764d1791d9cfd18b3dc2d463acda6e1e72b6159a50
                                                  SSDEEP:6144:cf+BLtABPDsth6Ej/UZkI4TjkRy5fafTy4lI1D080T:vtK+I4TjkRyTF1DcT
                                                  TLSH:CF544C0027EC8B56E2FF4BB9E4B01161C3B1B466B83EDB4E6D4461DE2923780D955BB3
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L............"...0..>...........8... ...`....@.. ....................................`................................
                                                  Icon Hash:90cececece8e8eb0
                                                  Entrypoint:0x443802
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0xC5F44CBF [Fri Mar 29 21:53:03 2075 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  adc byte ptr [ecx], dl
                                                  adc al, byte ptr [eax]
                                                  or byte ptr [edi], al
                                                  or dword ptr [esi], eax
                                                  or al, byte ptr [030C040Bh]
                                                  or eax, 0F010E02h
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax+eax], cl
                                                  or byte ptr [eax], al
                                                  mov word ptr [eax], es
                                                  or byte ptr [eax], al
                                                  dec esp
                                                  add byte ptr [eax], cl
                                                  add ah, cl
                                                  add byte ptr [eax], cl
                                                  add byte ptr [eax+eax], ch
                                                  or byte ptr [eax], al
                                                  lodsb
                                                  add byte ptr [eax], cl
                                                  add byte ptr [eax+eax+08h], ch
                                                  add ah, ch
                                                  add byte ptr [eax], cl
                                                  add byte ptr [eax+eax], bl
                                                  or byte ptr [eax], al
                                                  pushfd
                                                  add byte ptr [eax], cl
                                                  add byte ptr [eax+eax+08h], bl
                                                  add ah, bl
                                                  add byte ptr [eax], cl
                                                  add byte ptr [eax+eax], bh
                                                  or byte ptr [eax], al
                                                  mov esp, 7C000800h
                                                  add byte ptr [eax], cl
                                                  add ah, bh
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx], al
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx+42000800h], al
                                                  add byte ptr [eax], cl
                                                  add dl, al
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx], ah
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx+62000800h], ah
                                                  add byte ptr [eax], cl
                                                  add dl, ah
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx], dl
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx+52000800h], dl
                                                  add byte ptr [eax], cl
                                                  add dl, dl
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx], dh
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx+72000800h], dh
                                                  add byte ptr [eax], cl
                                                  add dl, dh
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx], cl
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx+4A000800h], cl
                                                  add byte ptr [eax], cl
                                                  add dl, cl
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx], ch
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx+6A000800h], ch
                                                  add byte ptr [eax], cl
                                                  add dl, ch
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx], bl
                                                  add byte ptr [eax], cl
                                                  add byte ptr [edx+5A000800h], bl
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x437b00x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x5f8.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x480000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x4371c0x38.text
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000x43df80x43e007c07c5888e5d8aaaf41fbdfae55e8cebFalse0.4059694406077348data5.873261426186277IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x460000x5f80x600e56535dfcdf60b6c9b46ebd8049b15dfFalse0.4361979166666667data4.264503201017009IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0x480000xc0x2002275898c85138789003e770a037ac41eFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_VERSION0x460900x368data0.4231651376146789
                                                  RT_MANIFEST0x464080x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Sep 14, 2024 12:38:59.799006939 CEST49730443192.168.2.4188.114.97.3
                                                  Sep 14, 2024 12:38:59.799042940 CEST44349730188.114.97.3192.168.2.4
                                                  Sep 14, 2024 12:38:59.799118996 CEST49730443192.168.2.4188.114.97.3
                                                  Sep 14, 2024 12:38:59.819339037 CEST49730443192.168.2.4188.114.97.3
                                                  Sep 14, 2024 12:38:59.819392920 CEST44349730188.114.97.3192.168.2.4
                                                  Sep 14, 2024 12:39:00.299626112 CEST44349730188.114.97.3192.168.2.4
                                                  Sep 14, 2024 12:39:00.299772024 CEST49730443192.168.2.4188.114.97.3
                                                  Sep 14, 2024 12:39:00.303523064 CEST49730443192.168.2.4188.114.97.3
                                                  Sep 14, 2024 12:39:00.303550005 CEST44349730188.114.97.3192.168.2.4
                                                  Sep 14, 2024 12:39:00.303961039 CEST44349730188.114.97.3192.168.2.4
                                                  Sep 14, 2024 12:39:00.352572918 CEST49730443192.168.2.4188.114.97.3
                                                  Sep 14, 2024 12:39:00.361394882 CEST49730443192.168.2.4188.114.97.3
                                                  Sep 14, 2024 12:39:00.403490067 CEST44349730188.114.97.3192.168.2.4
                                                  Sep 14, 2024 12:39:00.461154938 CEST44349730188.114.97.3192.168.2.4
                                                  Sep 14, 2024 12:39:00.461282015 CEST44349730188.114.97.3192.168.2.4
                                                  Sep 14, 2024 12:39:00.461338997 CEST49730443192.168.2.4188.114.97.3
                                                  Sep 14, 2024 12:39:00.467883110 CEST49730443192.168.2.4188.114.97.3
                                                  Sep 14, 2024 12:39:00.487680912 CEST49731443192.168.2.4104.21.85.189
                                                  Sep 14, 2024 12:39:00.487768888 CEST44349731104.21.85.189192.168.2.4
                                                  Sep 14, 2024 12:39:00.487880945 CEST49731443192.168.2.4104.21.85.189
                                                  Sep 14, 2024 12:39:00.488228083 CEST49731443192.168.2.4104.21.85.189
                                                  Sep 14, 2024 12:39:00.488311052 CEST44349731104.21.85.189192.168.2.4
                                                  Sep 14, 2024 12:39:01.188529015 CEST44349731104.21.85.189192.168.2.4
                                                  Sep 14, 2024 12:39:01.188735962 CEST49731443192.168.2.4104.21.85.189
                                                  Sep 14, 2024 12:39:01.208926916 CEST49731443192.168.2.4104.21.85.189
                                                  Sep 14, 2024 12:39:01.208967924 CEST44349731104.21.85.189192.168.2.4
                                                  Sep 14, 2024 12:39:01.209888935 CEST44349731104.21.85.189192.168.2.4
                                                  Sep 14, 2024 12:39:01.218763113 CEST49731443192.168.2.4104.21.85.189
                                                  Sep 14, 2024 12:39:01.263442993 CEST44349731104.21.85.189192.168.2.4
                                                  Sep 14, 2024 12:39:01.531568050 CEST44349731104.21.85.189192.168.2.4
                                                  Sep 14, 2024 12:39:01.531696081 CEST44349731104.21.85.189192.168.2.4
                                                  Sep 14, 2024 12:39:01.531784058 CEST44349731104.21.85.189192.168.2.4
                                                  Sep 14, 2024 12:39:01.531888008 CEST49731443192.168.2.4104.21.85.189
                                                  Sep 14, 2024 12:39:01.531920910 CEST44349731104.21.85.189192.168.2.4
                                                  Sep 14, 2024 12:39:01.531975985 CEST44349731104.21.85.189192.168.2.4
                                                  Sep 14, 2024 12:39:01.531990051 CEST49731443192.168.2.4104.21.85.189
                                                  Sep 14, 2024 12:39:01.532037020 CEST49731443192.168.2.4104.21.85.189
                                                  Sep 14, 2024 12:39:01.540324926 CEST49731443192.168.2.4104.21.85.189
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Sep 14, 2024 12:38:59.782867908 CEST6125553192.168.2.41.1.1.1
                                                  Sep 14, 2024 12:38:59.791814089 CEST53612551.1.1.1192.168.2.4
                                                  Sep 14, 2024 12:39:00.475488901 CEST6164053192.168.2.41.1.1.1
                                                  Sep 14, 2024 12:39:00.486989975 CEST53616401.1.1.1192.168.2.4
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Sep 14, 2024 12:38:59.782867908 CEST192.168.2.41.1.1.10x7e9Standard query (0)freegeoip.appA (IP address)IN (0x0001)false
                                                  Sep 14, 2024 12:39:00.475488901 CEST192.168.2.41.1.1.10x4fb4Standard query (0)ipbase.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Sep 14, 2024 12:38:59.791814089 CEST1.1.1.1192.168.2.40x7e9No error (0)freegeoip.app188.114.97.3A (IP address)IN (0x0001)false
                                                  Sep 14, 2024 12:38:59.791814089 CEST1.1.1.1192.168.2.40x7e9No error (0)freegeoip.app188.114.96.3A (IP address)IN (0x0001)false
                                                  Sep 14, 2024 12:39:00.486989975 CEST1.1.1.1192.168.2.40x4fb4No error (0)ipbase.com104.21.85.189A (IP address)IN (0x0001)false
                                                  Sep 14, 2024 12:39:00.486989975 CEST1.1.1.1192.168.2.40x4fb4No error (0)ipbase.com172.67.209.71A (IP address)IN (0x0001)false
                                                  • freegeoip.app
                                                  • ipbase.com
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.449730188.114.97.34431732C:\Users\user\Desktop\Loader.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-09-14 10:39:00 UTC67OUTGET /xml/ HTTP/1.1
                                                  Host: freegeoip.app
                                                  Connection: Keep-Alive
                                                  2024-09-14 10:39:00 UTC635INHTTP/1.1 301 Moved Permanently
                                                  Date: Sat, 14 Sep 2024 10:39:00 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 167
                                                  Connection: close
                                                  Cache-Control: max-age=3600
                                                  Expires: Sat, 14 Sep 2024 11:39:00 GMT
                                                  Location: https://ipbase.com/xml/
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5Be7RM2vkQ5hqKSLqbqisqE16t8YkEv6k%2BW37IfS05tyJ7O46iH1c1Vwr3xM0OGxsdukP1dfj9SO71pBYaC7eMyn1St0e3r53gohfv7FvOWdvytfINLUuc5DfJr5VRtE"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8c2fc02b98f56a58-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-09-14 10:39:00 UTC167INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 63 6c 6f 75 64 66 6c 61 72 65 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>cloudflare</center></body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.449731104.21.85.1894431732C:\Users\user\Desktop\Loader.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-09-14 10:39:01 UTC64OUTGET /xml/ HTTP/1.1
                                                  Host: ipbase.com
                                                  Connection: Keep-Alive
                                                  2024-09-14 10:39:01 UTC737INHTTP/1.1 404 Not Found
                                                  Date: Sat, 14 Sep 2024 10:39:01 GMT
                                                  Content-Type: text/html; charset=utf-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Age: 10899
                                                  Cache-Control: public,max-age=0,must-revalidate
                                                  Cache-Status: "Netlify Edge"; hit
                                                  Vary: Accept-Encoding
                                                  X-Nf-Request-Id: 01J7R1TPV31H16NKRFQCHVFQ90
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5XuBdYnjcdt7DU%2FpomCHXBqMINcKqwIyis2qQ8xm5Zm0SDCbto%2BOdbVSZkkfUdt4WTiZwkFWq75e4lJpZnZL%2B5pvjgJlLSwVFKhoEWm83olY5nT6uOZzDwk%2Bk7GJ"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8c2fc0321f1b8c57-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-09-14 10:39:01 UTC632INData Raw: 63 30 61 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 6e 6f 22 3e 0a 0a 20 20 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d
                                                  Data Ascii: c0a<!DOCTYPE html><html> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no"> <title>Page Not Found</title> <link href='https://fonts.googleapis.com
                                                  2024-09-14 10:39:01 UTC1369INData Raw: 6e 67 3a 20 30 3b 0a 20 20 20 20 7d 0a 0a 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 32 70 78 3b 0a 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 32 34 70 78 3b 0a 20 20 20 20 7d 0a 0a 20 20 20 20 2e 6d 61 69 6e 20 7b 0a 20 20 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0a 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 66 6c 65 78 3b 0a 20 20 20 20 20 20 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 20 63 6f 6c 75 6d 6e 3b 0a 20 20 20 20 20 20 61 6c 69 67 6e 2d 69 74 65 6d 73 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 6a 75 73 74 69 66 79 2d 63 6f 6e 74 65 6e 74 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 68 65 69 67 68 74 3a
                                                  Data Ascii: ng: 0; } h1 { margin: 0; font-size: 22px; line-height: 24px; } .main { position: relative; display: flex; flex-direction: column; align-items: center; justify-content: center; height:
                                                  2024-09-14 10:39:01 UTC1088INData Raw: 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 3d 22 23 30 30 37 30 36 37 22 20 64 3d 22 4d 31 31 2e 39 39 39 38 38 33 36 2c 34 2e 30 39 33 37 30 38 30 33 20 4c 38 2e 35 35 38 30 39 35 31 37 2c 37 2e 34 33 32 39 34 39 35 33 20 43 38 2e 32 33 35 33 31 34 35 39 2c 37 2e 37 34 36 31 31 32 39 38 20 38 2e 32 33 35 33 31 34 35 39 2c 38 2e 32 35 33 38 38 37 33 36 20 38 2e 35 35 38 30 39 35 31 37 2c 38 2e 35 36 36 39 33 37 36 39 20 4c 31 32 2c 31 31 2e 39 30 36 32 39 32 31 20 4c 39 2e 38 34 31 38 37 38 37 31 2c 31 34 20 4c 34 2e 32 34 32 30 38 35 34 34 2c 38 2e 35 36 36 39 33 37 35 31 20 43 33 2e 39 31 39 33 30 34 38 35 2c 38 2e 32 35 33 38 38 37 31 39 20 33 2e 39 31 39 33 30 34 38 35 2c 37 2e 37 34 36 31 31 32 38 31 20 34 2e 32 34 32 30 38 35 34 34 2c 37 2e 34 33 32
                                                  Data Ascii: <path fill="#007067" d="M11.9998836,4.09370803 L8.55809517,7.43294953 C8.23531459,7.74611298 8.23531459,8.25388736 8.55809517,8.56693769 L12,11.9062921 L9.84187871,14 L4.24208544,8.56693751 C3.91930485,8.25388719 3.91930485,7.74611281 4.24208544,7.432
                                                  2024-09-14 10:39:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Target ID:0
                                                  Start time:06:38:58
                                                  Start date:14/09/2024
                                                  Path:C:\Users\user\Desktop\Loader.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                  Imagebase:0x1fd86360000
                                                  File size:280'576 bytes
                                                  MD5 hash:C0FEB087F1CFA85FDB001E059F4C95C7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000002.1737602637.000001FD8829E000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: JoeSecurity_BlackGuard, Description: Yara detected BlackGuard, Source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_44CaliberStealer, Description: Yara detected 44Caliber Stealer, Source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000000.1703753257.000001FD86362000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                  • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000000.00000002.1737602637.000001FD881F7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:15.4%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:3
                                                    Total number of Limit Nodes:0
                                                    execution_graph 12084 7ffd9b7d7300 12086 7ffd9b7d730f SendARP 12084->12086 12087 7ffd9b7d73e8 12086->12087

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 586 7ffd9b7d4726-7ffd9b7d4733 587 7ffd9b7d4735-7ffd9b7d473d 586->587 588 7ffd9b7d473e-7ffd9b7d4807 586->588 587->588 592 7ffd9b7d4809-7ffd9b7d4812 588->592 593 7ffd9b7d4873 588->593 592->593 594 7ffd9b7d4814-7ffd9b7d4820 592->594 595 7ffd9b7d4875-7ffd9b7d489a 593->595 596 7ffd9b7d4859-7ffd9b7d4871 594->596 597 7ffd9b7d4822-7ffd9b7d4834 594->597 602 7ffd9b7d489c-7ffd9b7d48a5 595->602 603 7ffd9b7d4906 595->603 596->595 598 7ffd9b7d4836 597->598 599 7ffd9b7d4838-7ffd9b7d484b 597->599 598->599 599->599 601 7ffd9b7d484d-7ffd9b7d4855 599->601 601->596 602->603 605 7ffd9b7d48a7-7ffd9b7d48b3 602->605 604 7ffd9b7d4908-7ffd9b7d49b0 603->604 616 7ffd9b7d49b2-7ffd9b7d49bc 604->616 617 7ffd9b7d4a1e 604->617 606 7ffd9b7d48ec-7ffd9b7d4904 605->606 607 7ffd9b7d48b5-7ffd9b7d48c7 605->607 606->604 608 7ffd9b7d48c9 607->608 609 7ffd9b7d48cb-7ffd9b7d48de 607->609 608->609 609->609 611 7ffd9b7d48e0-7ffd9b7d48e8 609->611 611->606 616->617 618 7ffd9b7d49be-7ffd9b7d49cb 616->618 619 7ffd9b7d4a20-7ffd9b7d4a49 617->619 620 7ffd9b7d4a04-7ffd9b7d4a1c 618->620 621 7ffd9b7d49cd-7ffd9b7d49df 618->621 626 7ffd9b7d4a4b-7ffd9b7d4a56 619->626 627 7ffd9b7d4ab3 619->627 620->619 622 7ffd9b7d49e1 621->622 623 7ffd9b7d49e3-7ffd9b7d49f6 621->623 622->623 623->623 625 7ffd9b7d49f8-7ffd9b7d4a00 623->625 625->620 626->627 629 7ffd9b7d4a58-7ffd9b7d4a66 626->629 628 7ffd9b7d4ab5-7ffd9b7d4b46 627->628 637 7ffd9b7d4b4c-7ffd9b7d4b5b 628->637 630 7ffd9b7d4a68-7ffd9b7d4a7a 629->630 631 7ffd9b7d4a9f-7ffd9b7d4ab1 629->631 633 7ffd9b7d4a7c 630->633 634 7ffd9b7d4a7e-7ffd9b7d4a91 630->634 631->628 633->634 634->634 635 7ffd9b7d4a93-7ffd9b7d4a9b 634->635 635->631 638 7ffd9b7d4b63-7ffd9b7d4bc8 call 7ffd9b7d4be4 637->638 639 7ffd9b7d4b5d 637->639 646 7ffd9b7d4bca 638->646 647 7ffd9b7d4bcf-7ffd9b7d4be3 638->647 639->638 646->647
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1743464909.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd9b7c0000_Loader.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 985718232346d73e8fb062f2ce6f6ee81625fc294095f4266eff2aa06d053c1f
                                                    • Instruction ID: 41ae763f277465ec2969035feb25a810f3ba0427e118e228b241bee469e15af3
                                                    • Opcode Fuzzy Hash: 985718232346d73e8fb062f2ce6f6ee81625fc294095f4266eff2aa06d053c1f
                                                    • Instruction Fuzzy Hash: DCF1A230A09A8D8FEBA8DF28C8557E937E1FF94350F04436ED85DC72A5DB3499458B81

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 671 7ffd9b7d54d2-7ffd9b7d54df 672 7ffd9b7d54ea-7ffd9b7d55b7 671->672 673 7ffd9b7d54e1-7ffd9b7d54e9 671->673 677 7ffd9b7d55b9-7ffd9b7d55c2 672->677 678 7ffd9b7d5623 672->678 673->672 677->678 680 7ffd9b7d55c4-7ffd9b7d55d0 677->680 679 7ffd9b7d5625-7ffd9b7d564a 678->679 687 7ffd9b7d564c-7ffd9b7d5655 679->687 688 7ffd9b7d56b6 679->688 681 7ffd9b7d5609-7ffd9b7d5621 680->681 682 7ffd9b7d55d2-7ffd9b7d55e4 680->682 681->679 683 7ffd9b7d55e6 682->683 684 7ffd9b7d55e8-7ffd9b7d55fb 682->684 683->684 684->684 686 7ffd9b7d55fd-7ffd9b7d5605 684->686 686->681 687->688 690 7ffd9b7d5657-7ffd9b7d5663 687->690 689 7ffd9b7d56b8-7ffd9b7d56dd 688->689 696 7ffd9b7d574b 689->696 697 7ffd9b7d56df-7ffd9b7d56e9 689->697 691 7ffd9b7d569c-7ffd9b7d56b4 690->691 692 7ffd9b7d5665-7ffd9b7d5677 690->692 691->689 694 7ffd9b7d5679 692->694 695 7ffd9b7d567b-7ffd9b7d568e 692->695 694->695 695->695 698 7ffd9b7d5690-7ffd9b7d5698 695->698 700 7ffd9b7d574d-7ffd9b7d577b 696->700 697->696 699 7ffd9b7d56eb-7ffd9b7d56f8 697->699 698->691 701 7ffd9b7d56fa-7ffd9b7d570c 699->701 702 7ffd9b7d5731-7ffd9b7d5749 699->702 707 7ffd9b7d57eb 700->707 708 7ffd9b7d577d-7ffd9b7d5788 700->708 703 7ffd9b7d570e 701->703 704 7ffd9b7d5710-7ffd9b7d5723 701->704 702->700 703->704 704->704 706 7ffd9b7d5725-7ffd9b7d572d 704->706 706->702 709 7ffd9b7d57ed-7ffd9b7d58c5 707->709 708->707 710 7ffd9b7d578a-7ffd9b7d5798 708->710 720 7ffd9b7d58cb-7ffd9b7d58da 709->720 711 7ffd9b7d579a-7ffd9b7d57ac 710->711 712 7ffd9b7d57d1-7ffd9b7d57e9 710->712 713 7ffd9b7d57ae 711->713 714 7ffd9b7d57b0-7ffd9b7d57c3 711->714 712->709 713->714 714->714 716 7ffd9b7d57c5-7ffd9b7d57cd 714->716 716->712 721 7ffd9b7d58dc 720->721 722 7ffd9b7d58e2-7ffd9b7d5944 call 7ffd9b7d5960 720->722 721->722 729 7ffd9b7d594b-7ffd9b7d595f 722->729 730 7ffd9b7d5946 722->730 730->729
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1743464909.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd9b7c0000_Loader.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 77be82073710bce69e446fc71a30b751aab2f1ababafd2b34d7eebe196eca95c
                                                    • Instruction ID: 985f6d4d41e77e0f9be9d3f6501b045b06d03f039cd179ebd720d41d89cc4d9c
                                                    • Opcode Fuzzy Hash: 77be82073710bce69e446fc71a30b751aab2f1ababafd2b34d7eebe196eca95c
                                                    • Instruction Fuzzy Hash: 27E1E430A09A8D8FEBA8DF28C8557E977E1FF94310F14436ED84DC72A1DB74A9448B81

                                                    Control-flow Graph

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1743464909.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd9b7c0000_Loader.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fbda9798ff420944d362ce73eed5b6cfe2e8f550d0ef172e87375ceabee8f4f8
                                                    • Instruction ID: 48026ca4514b0a7976220223c9dec3d77a4c841baa953e8a651545e99ad1167d
                                                    • Opcode Fuzzy Hash: fbda9798ff420944d362ce73eed5b6cfe2e8f550d0ef172e87375ceabee8f4f8
                                                    • Instruction Fuzzy Hash: 50E13572A0E7865FE745F7B894A68E97BE0EF52220B0941FED099CB1F3DA1C1842C311
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1743464909.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd9b7c0000_Loader.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6d4a15359c1ce6fc925e9afed2602c3056e48aa0d55e8dd2488b617e555bbafd
                                                    • Instruction ID: b0412173150aee173670181d027f3ecf8277c72b424ab6c3a37119fc3e221e73
                                                    • Opcode Fuzzy Hash: 6d4a15359c1ce6fc925e9afed2602c3056e48aa0d55e8dd2488b617e555bbafd
                                                    • Instruction Fuzzy Hash: 85C12671A0E78A5FD745EBB884669E97BE0EF52320B0901FED09ADB1F3DA1C5842C701
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1743464909.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd9b7c0000_Loader.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 96eec431ec0df469ee7e02245fa541f1e9c2a171f41c39861f7de1ac85c0470f
                                                    • Instruction ID: 787b45e3b7f9a475cc0eb264be8f7f621080ab692d241597e96c79264f4d78ff
                                                    • Opcode Fuzzy Hash: 96eec431ec0df469ee7e02245fa541f1e9c2a171f41c39861f7de1ac85c0470f
                                                    • Instruction Fuzzy Hash: DCB12571A0F7899FD745EBB884669E87BE0EF56320B0901FED05ADB5B3DA1C5842C701
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1743464909.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd9b7c0000_Loader.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 89ed24ea8e6420830857b1b050ec0f810ac36967a8b601a22ccef40408c503ae
                                                    • Instruction ID: 543f4213ad4ad9ee7d348ef121c35188fbfd79b8bdbe1db0a124c5d5849cfa58
                                                    • Opcode Fuzzy Hash: 89ed24ea8e6420830857b1b050ec0f810ac36967a8b601a22ccef40408c503ae
                                                    • Instruction Fuzzy Hash: CCB1337190F78A9FE745ABB884669E87BE0EF5632070901FED09ADB5B3DA1C5842C701

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1743464909.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd9b7c0000_Loader.jbxd
                                                    Similarity
                                                    • API ID: Send
                                                    • String ID:
                                                    • API String ID: 121738739-0
                                                    • Opcode ID: 159ee86dd63286449e8182c7cc1feacd3124b1b293cbc7f02a8d881b22102085
                                                    • Instruction ID: 706d51086377eaccf411f7ce721e5ec03c780bf60a8b31fd064608dae1cd4693
                                                    • Opcode Fuzzy Hash: 159ee86dd63286449e8182c7cc1feacd3124b1b293cbc7f02a8d881b22102085
                                                    • Instruction Fuzzy Hash: F141F63090DB884FD719DBA898556E9BFF0EB96311F0442BFD089D71A3CB646809CB92
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1743464909.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd9b7c0000_Loader.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 73e9b290bfc419be751cae0d87fdd5429c2efebdaa37e71cbbe25e216203d85c
                                                    • Instruction ID: b4d5c03f7cfbf68afab8094866771dd06dc0d7589ec22b08a750a8988dbbf99e
                                                    • Opcode Fuzzy Hash: 73e9b290bfc419be751cae0d87fdd5429c2efebdaa37e71cbbe25e216203d85c
                                                    • Instruction Fuzzy Hash: 11710EA464E3C56FE75367B818725B67FE8DF8322971800EEE0D9CA0A7D90C1857C352