Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
loader.exe

Overview

General Information

Sample name:loader.exe
Analysis ID:1585383
MD5:0fd9836e2142bc85ced43d8316650b6c
SHA1:17ad9773af8f56332d728f94890d9f5a37ec5d03
SHA256:b870c9ee4b011fdb66b100275c583a3dc2e5884af31a4819f4b484ef839253fb
Tags:exeuser-aachum
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
.NET source code contains potential unpacker
AI detected suspicious sample
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loader.exe (PID: 7484 cmdline: "C:\Users\user\Desktop\loader.exe" MD5: 0FD9836E2142BC85CED43D8316650B6C)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-07T15:42:59.910159+010020589981A Network Trojan was detected192.168.2.449731147.185.221.2448428TCP
2025-01-07T15:42:59.910159+010020589981A Network Trojan was detected192.168.2.450507147.185.221.2448428TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: loader.exeReversingLabs: Detection: 65%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: loader.exeJoe Sandbox ML: detected
Source: loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Networking

barindex
Source: Network trafficSuricata IDS: 2058998 - Severity 1 - ET MALWARE Sheet RAT CnC Checkin : 192.168.2.4:49731 -> 147.185.221.24:48428
Source: Network trafficSuricata IDS: 2058998 - Severity 1 - ET MALWARE Sheet RAT CnC Checkin : 192.168.2.4:50507 -> 147.185.221.24:48428
Source: global trafficTCP traffic: 192.168.2.4:49731 -> 147.185.221.24:48428
Source: global trafficTCP traffic: 192.168.2.4:50236 -> 162.159.36.2:53
Source: Joe Sandbox ViewIP Address: 147.185.221.24 147.185.221.24
Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: co-updated.gl.at.ply.gg
Source: loader.exe, 00000000.00000002.4138027546.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7CE9AD NtProtectVirtualMemory,0_2_00007FFD9B7CE9AD
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7C7FE20_2_00007FFD9B7C7FE2
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7C14480_2_00007FFD9B7C1448
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7C34400_2_00007FFD9B7C3440
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7CBAE80_2_00007FFD9B7CBAE8
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7CC6810_2_00007FFD9B7CC681
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7C16000_2_00007FFD9B7C1600
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7C72360_2_00007FFD9B7C7236
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7C98E70_2_00007FFD9B7C98E7
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7D10D80_2_00007FFD9B7D10D8
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7C02FD0_2_00007FFD9B7C02FD
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7CBD4B0_2_00007FFD9B7CBD4B
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7C9CB10_2_00007FFD9B7C9CB1
Source: loader.exe, 00000000.00000000.1674231829.0000000000572000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe. vs loader.exe
Source: loader.exeBinary or memory string: OriginalFilenameClient.exe. vs loader.exe
Source: loader.exe, FDdCFtRGHOCQM.csSecurity API names: File.GetAccessControl
Source: loader.exe, FDdCFtRGHOCQM.csSecurity API names: File.SetAccessControl
Source: loader.exe, FDdCFtRGHOCQM.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
Source: loader.exe, qlllUayZ.csSecurity API names: Directory.GetAccessControl
Source: loader.exe, qlllUayZ.csSecurity API names: Directory.SetAccessControl
Source: loader.exe, rUGHQDGuDhlrp.csSecurity API names: Directory.GetAccessControl
Source: loader.exe, rUGHQDGuDhlrp.csSecurity API names: Directory.SetAccessControl
Source: loader.exe, rUGHQDGuDhlrp.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
Source: loader.exe, dzYeBNghHSwLaeT.csSecurity API names: File.GetAccessControl
Source: loader.exe, dzYeBNghHSwLaeT.csSecurity API names: File.SetAccessControl
Source: loader.exe, wUnKJwFwMLX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: classification engineClassification label: mal76.evad.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\loader.exeMutant created: NULL
Source: C:\Users\user\Desktop\loader.exeMutant created: \Sessions\1\BaseNamedObjects\Windows company
Source: loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: loader.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\loader.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: loader.exeReversingLabs: Detection: 65%
Source: C:\Users\user\Desktop\loader.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: devenum.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: netfxperf.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: esentprf.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: perfts.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: utildll.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: tdh.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: msdtcuiu.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: atl.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: msdtcprx.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: mtxclu.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: clusapi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: resutils.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: ktmw32.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: msscntrs.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: perfdisk.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: wmiclnt.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: perfnet.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: browcli.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: perfos.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: perfproc.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
Source: loader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: loader.exe, RHxDmhGvQNRS.cs.Net Code: NXUCOPGm
Source: loader.exeStatic PE information: 0xF5FE416F [Wed Oct 13 03:20:15 2100 UTC]
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7CBAE8 push ecx; ret 0_2_00007FFD9B7CC25E
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7D067D push E95B6C3Bh; ret 0_2_00007FFD9B7D0699
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7CA905 push eax; iretd 0_2_00007FFD9B7CA91D
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FFD9B7C00AD pushad ; iretd 0_2_00007FFD9B7C00C1
Source: loader.exe, bJLBJJiOps.csHigh entropy of concatenated method names: '_003CStart_003Eb__1_0', '_003CUninstall_003Eb__2_0', '_003CLoopInstall_003Eb__7_0', '_003CStartAsBypass_003Eb__10_0', 'bivKevTybFCvNV', 'gJXZTMvkOVpH', 'lwrzJpOQYfAJRd', 'MYOxgfdYrQZcfy', 'ooneMeODmYGNI', 'WPCiHYqHsbJI'
Source: loader.exe, RHxDmhGvQNRS.csHigh entropy of concatenated method names: 'iMuWkPBrMs', 'LouCbBjQcSXtT', 'GmKMcbBYXf', 'npYmjlEOOsyn', 'TOdAqyKS', 'EddqfkQhmROZ', 'MKdsgTeFZIzGsN', 'AhZUKMkvJsGUxgF', 'YefCSWyRroVfU', 'kmWSgEruObcP'
Source: loader.exe, vRaSIojti.csHigh entropy of concatenated method names: 'MMyPiBeqb', 'YvlySdePnRnR', 'WYXkjTzkhwSerUS', 'TcAzdmzfc', 'eJUGQWvS', 'qLQuXbvrzSTa', 'MFTpmRQkZ', 'HjopQbfwjZsbyC', 'dXiuANIZVxPmb', 'dBrRUJLjmeQTV'
Source: loader.exe, qlllUayZ.csHigh entropy of concatenated method names: 'nDqpbiTIXcjysbS', 'xLZCmzqGJekfR', 'xWpkbbUiT', 'SeRHNExKSyXOZW', 'nMkgxyoqO', 'MJHArROskjHh', 'sEgaMSlixSanO', 'CWqenDcBvpKah', 'WpmDFdrbQ', 'bYcwOqhMcgM'
Source: loader.exe, jqEtvsjElPJ.csHigh entropy of concatenated method names: 'MBsrdtNdDnnnssD', 'yjJHPGFvwaFtUbd', 'BUnXwZdGUkSv', 'RBConFCG', 'jGvwvCnT', 'cKMmXEfAZ', 'CmfoJteY', 'FgVbUzlh', 'zebSBbqlqedx', 'mgwDQESlD'
Source: loader.exe, stTBaitjo.csHigh entropy of concatenated method names: 'ruArbZIzucGR', 'rrFsytWtuoXzRVh', 'phuVaErvy', 'LVbRSCawcKVpvpS', 'wFcsKDaqEuMvW', 'AJuDiASdVVYUtW', 'AmEDoHlTFkHukN', 'qeapKLvsGRT', 'kHTpJECEHHs', 'fPpoSaFhPxeuu'
Source: loader.exe, iWpfJXRBcsiSe.csHigh entropy of concatenated method names: 'iDxSBFvrvsGMhGy', 'TZSUYCtgTBWivcC', 'cNIOprwB', 'rawYwqLDiYJzJX', 'JQyAjNvTqEkT', 'kEbcRggbxIWKKeM', 'sCSpcFYt', 'RawHFUMWOSdwghd', 'ELIbpZiiPxBReU', 'gihAFkUrnKow'
Source: loader.exe, OSwSXnJrgr.csHigh entropy of concatenated method names: 'MVwseiwerfsLHEK', 'diLKteoarZc', 'MKPnMAGddAJmVu', 'kWGoNNSfJVgCi', 'WAEGERgPEzGy', 'rdZYozsDDlkPe', 'fGSfyXxHAEgRcEV', 'GiOgaCjwrC', 'cSPTrZXBJmUHbj', 'dVsXWoimeCAyT'
Source: loader.exe, rUGHQDGuDhlrp.csHigh entropy of concatenated method names: 'DGbfasnCP', 'wTzQCjOM', 'nBNiJlAchsgSBWb', 'oaUVYuoEFKwDp', 'TSYtBJpYSuZPFK', 'huxXiOJtratNJ', 'yowmpYOuIVRs', 'IavIodUYPz', 'GeKYgSIwgvTF', 'dQmVnmcGqyBT'
Source: loader.exe, leMxQLftuJ.csHigh entropy of concatenated method names: 'HlxmVSABVQitbYc', 'lprSGMWJnLkxf', 'rWSUITiA', 'pVMbzCllZ', 'ctDCqruOnzKiDV', 'YMaHPJAkeC', 'tkWHCaKKCLnTcdN', 'uBAHSqLb', 'KdKebJZAtxKsgw', 'XsTEltyeBEGjd'
Source: loader.exe, FDdCFtRGHOCQM.csHigh entropy of concatenated method names: 'xvgOgzkICCM', 'alQnzCmA', 'IjLxzlUbA', 'gwfECITpA', 'xAbqDSgp', 'OAeLNoMURhO', 'gCufFvhNff', 'lzKIIVtgFe', 'mHCkRPqnC', 'mlRygKyXy'
Source: loader.exe, dzYeBNghHSwLaeT.csHigh entropy of concatenated method names: 'eyApHeFUmp', 'LMJeNuOcJaMS', 'DXizEMHkncCoIv', 'zuDrMmVUxnjQLB', 'nRgNljwGQ', 'hqXkHpFzYdO', 'UFBiDkMVvvi', 'okIuKHComSev', 'kqxeRnYvQwaLDgL', 'vdlHuvWhKpRaakC'
Source: loader.exe, MAaNXHPtUGPA.csHigh entropy of concatenated method names: 'nowExJDNPXzUVOc', 'hnlgCLUP', 'XkwKAhfrk', 'xgBjowRxdat', 'tmnnTeTv', 'UgvaZHDOqTcl', 'fZgDxjlOroPVqJ', 'NNBYovdzFJO', 'OimGQRCHNHQgjK', 'crfEjyfAcS'
Source: loader.exe, WuwjxQjqxxhUmd.csHigh entropy of concatenated method names: '_003CScreenShot_003Eb__16_0', 'SrujlyRTX', 'xAYrtwqqMzfFBlj', 'nptNDudrkHXbxsF', 'YnzPLzDAqead', 'MpIAmLcaKsDX', 'HlZPtUuFhOmTo', 'ltWZTAOXSOaLhc', 'NuvserSa', 'lGiXfbWhyXqg'
Source: loader.exe, JOBvRAQMqQTcJE.csHigh entropy of concatenated method names: 'zZdmUzNmubXYo', 'oitNwaBDwihoKSu', 'NhOLExpVB', 'wbHTtbbSCiaONd', 'wdvFgousnNpKd', 'qsYMHeavcoFMsQ', 'hzUkaHUuQ', 'ABiTGDRybLp', 'CGzKBAGz', 'wdgGOVZCjWy'
Source: loader.exe, NFoBFrADgPEd.csHigh entropy of concatenated method names: 'ipbFuUOMvyKyLDD', 'TFwlCnlNEsxpD', 'kFIWOmEBKMORRHe', 'tnxRNKIs', 'vDNBCXZIwNFpppR', 'SukWlWejByJsm', 'axQbSiqzIopIU', 'YMExfiuPYVJZZez', 'NhWKnHZN', 'jrSlvhcBkKo'
Source: loader.exe, xFNjOTRQu.csHigh entropy of concatenated method names: 'GWhsVCIFTV', 'DHvhHiry', 'cHCpapiwzNERa', 'VUoCOBeSWGHtyR', 'HkZSJkzU', 'SfUMFGRndQaMSg', 'wGKlvhgrQusc', 'zQFWAvkigRMP', 'UPhrpoEwVCaOZL', 'oESNenoMKDMXw'
Source: loader.exe, sQBzIOKx.csHigh entropy of concatenated method names: 'SqaFaHxmOfGyT', 'GccuePvdV', 'QyZoyyBcIzy', 'tPpPpwPHvCZFuW', 'TfimpUGpbhIo', 'ddpUMPiMFO', 'zNOYNZTtbSh', 'aNJVnaOigHzdRME', 'eoTOQInbGibBOPM', 'vgPGCtvmrgtrOlG'
Source: loader.exe, gnWfyphMe.csHigh entropy of concatenated method names: 'xezAuLbmi', 'BooPEUKzBQ', 'ugAUtRWU', 'FueFmCvKGPAnHqG', 'zHbdfiLNCDxygA', 'ERnJGKicBZzsmQR', 'puctJvrOWjQCj', 'xeFUvVUh', 'hRfZDfpYwkQHDDH', 'JaYnWtfswcVnR'
Source: loader.exe, hpWbfDQQRNsZfQ.csHigh entropy of concatenated method names: 'NcYduEtdsEvPIS', 'tGlOgieSM', 'VTIVMproyoIFKv', 'nLdXjnHxFTmoQ', 'IiJMmZklIgOEa', 'eDnvpesWB', 'cDNWDBZBbEpGztX', 'ACDxJfMyTCf', 'zlrmgOjjLNiGGN', 'WTXEuYSeqTDl'
Source: C:\Users\user\Desktop\loader.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MSDTC Bridge 3.0.0.0\LinkageJump to behavior
Source: C:\Users\user\Desktop\loader.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\.NET Memory Cache 4.0\LinkageJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\Desktop\loader.exeMemory allocated: D30000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\loader.exeMemory allocated: 1A8E0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\loader.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\loader.exeWindow / User API: threadDelayed 9375Jump to behavior
Source: C:\Users\user\Desktop\loader.exeWindow / User API: threadDelayed 419Jump to behavior
Source: C:\Users\user\Desktop\loader.exe TID: 7788Thread sleep time: -9223372036854770s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT UserName FROM Win32_ComputerSystem
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\loader.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: loader.exe, 00000000.00000002.4140459511.000000001C68E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor1
Source: loader.exe, 00000000.00000002.4138027546.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $Hyper-V Hypervisor Logical Processor
Source: loader.exe, 00000000.00000002.4139896661.000000001B4C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
Source: loader.exe, 00000000.00000002.4139896661.000000001B53B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Servicelb
Source: loader.exe, 00000000.00000002.4138027546.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: !Hyper-V Virtual Machine Bus Pipes
Source: loader.exe, 00000000.00000002.4140459511.000000001C68E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partition
Source: loader.exe, 00000000.00000002.4138027546.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: *Hyper-V Dynamic Memory Integration Service
Source: loader.exe, 00000000.00000002.4140459511.000000001C62E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisor
Source: loader.exe, 00000000.00000002.4139896661.000000001B4BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot
Source: loader.exe, 00000000.00000002.4139896661.000000001B4C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWal, %SystemRoot%\system32\mswsock.dll type="System.ServiceModel.Configuration.ComContractsSection, System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089"/>
Source: loader.exe, 00000000.00000002.4138027546.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )Hyper-V Hypervisor Root Virtual Processor
Source: loader.exe, 00000000.00000002.4138027546.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partition
Source: loader.exe, 00000000.00000002.4139896661.000000001B53B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor"b
Source: loader.exe, 00000000.00000002.4140459511.000000001C6FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service
Source: loader.exe, 00000000.00000002.4140459511.000000001C660000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 8Hyper-V ontvrnukjnsmrfw Bus
Source: loader.exe, 00000000.00000002.4140459511.000000001C62E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Servicey
Source: loader.exe, 00000000.00000002.4140459511.000000001C68E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AlDHyper-V Virtual Machine Bus Pipes
Source: loader.exe, 00000000.00000002.4138027546.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: cXvMci
Source: loader.exe, 00000000.00000002.4140459511.000000001C660000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V ontvrnukjnsmrfw Bus PipesbN
Source: loader.exe, 00000000.00000002.4140459511.000000001C62E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V ontvrnukjnsmrfw Bus Pipes-
Source: loader.exe, 00000000.00000002.4139896661.000000001B4C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V ontvrnukjnsmrfw Bus
Source: loader.exe, 00000000.00000002.4138027546.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor
Source: loader.exe, 00000000.00000002.4138027546.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: !Hyper-V Hypervisor Root Partition
Source: loader.exe, 00000000.00000002.4140459511.000000001C6FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partitionvw
Source: loader.exe, 00000000.00000002.4140459511.000000001C62E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V ontvrnukjnsmrfw Bus Pipess
Source: loader.exe, 00000000.00000002.4139896661.000000001B4C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V ontvrnukjnsmrfw Bus Pipes
Source: C:\Users\user\Desktop\loader.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\loader.exeMemory allocated: page read and write | page guardJump to behavior
Source: loader.exe, 00000000.00000002.4140459511.000000001C660000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: loader.exe, 00000000.00000002.4140459511.000000001C6CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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<@><@>448BF45CC4918C01552E499<@>user<@>128757<@>kva3cgmo<@>false<@>Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz,Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz @ 4<@>LTDVCW6WR<@>8GB<@>1GB<@>30 %<@>81 %<@>Microsoft Windows 10 Pro 64-bit<@>2.6<@>04.10.2023<@>Admin<@>Windows Defender<@>Program Manager
Source: loader.exe, 00000000.00000002.4140459511.000000001C660000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerVWCX
Source: loader.exe, 00000000.00000002.4140459511.000000001C6CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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<@><@>448BF45CC4918C01552E499<@>user<@>128757<@>kva3cgmo<@>false<@>Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz,Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz @ 4<@>LTDVCW6WR<@>8GB<@>1GB<@>30 %<@>81 %<@>Microsoft Windows 10 Pro 64-bit<@>2.6<@>04.10.2023<@>Admin<@>Windows Defender<@>Program Manager!
Source: loader.exe, 00000000.00000002.4140459511.000000001C660000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerckgr
Source: loader.exe, 00000000.00000002.4140459511.000000001C660000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerAzZ.
Source: C:\Users\user\Desktop\loader.exeQueries volume information: C:\Users\user\Desktop\loader.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\loader.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation BiasJump to behavior
Source: C:\Users\user\Desktop\loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
Windows Management Instrumentation
2
Windows Service
2
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Process Injection
251
Virtualization/Sandbox Evasion
LSASS Memory231
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS251
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Timestomp
Cached Domain Credentials123
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
loader.exe66%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
loader.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
co-updated.gl.at.ply.gg
147.185.221.24
truetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameloader.exe, 00000000.00000002.4138027546.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      147.185.221.24
      co-updated.gl.at.ply.ggUnited States
      12087SALSGIVERUStrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1585383
      Start date and time:2025-01-07 15:42:07 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 7m 0s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:7
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:loader.exe
      Detection:MAL
      Classification:mal76.evad.winEXE@1/0@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 94%
      • Number of executed functions: 11
      • Number of non-executed functions: 2
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240000 for current running targets taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiApSrv.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.253.45
      • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtEnumerateKey calls found.
      • Report size getting too big, too many NtOpenKey calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: loader.exe
      TimeTypeDescription
      09:42:58API Interceptor10265751x Sleep call for process: loader.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      147.185.221.24P3A946MOFP.exeGet hashmaliciousXWormBrowse
        BootstrapperV1.16.exeGet hashmaliciousXWormBrowse
          SharkHack.exeGet hashmaliciousXWormBrowse
            avaydna.exeGet hashmaliciousNjratBrowse
              ddos tool.exeGet hashmaliciousXWormBrowse
                L988Ph5sKX.exeGet hashmaliciousXWormBrowse
                  ANuh30XoVu.exeGet hashmaliciousXWormBrowse
                    p59UXHJRX3.exeGet hashmaliciousXenoRATBrowse
                      JdYlp3ChrS.exeGet hashmaliciousNjratBrowse
                        Extreme Injector v3.exeGet hashmaliciousXWormBrowse
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          SALSGIVERUSMy33xbeYIX.exeGet hashmaliciousNjratBrowse
                          • 147.185.221.16
                          YPzNsfg4nR.exeGet hashmaliciousXWormBrowse
                          • 147.185.221.21
                          sela.exeGet hashmaliciousNjratBrowse
                          • 147.185.221.17
                          P3A946MOFP.exeGet hashmaliciousXWormBrowse
                          • 147.185.221.24
                          BootstrapperV1.16.exeGet hashmaliciousXWormBrowse
                          • 147.185.221.24
                          SharkHack.exeGet hashmaliciousXWormBrowse
                          • 147.185.221.24
                          avaydna.exeGet hashmaliciousNjratBrowse
                          • 147.185.221.24
                          ddos tool.exeGet hashmaliciousXWormBrowse
                          • 147.185.221.24
                          L988Ph5sKX.exeGet hashmaliciousXWormBrowse
                          • 147.185.221.24
                          ANuh30XoVu.exeGet hashmaliciousXWormBrowse
                          • 147.185.221.24
                          No context
                          No context
                          No created / dropped files found
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):5.311958825841602
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                          • Win32 Executable (generic) a (10002005/4) 49.75%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Windows Screen Saver (13104/52) 0.07%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          File name:loader.exe
                          File size:558'592 bytes
                          MD5:0fd9836e2142bc85ced43d8316650b6c
                          SHA1:17ad9773af8f56332d728f94890d9f5a37ec5d03
                          SHA256:b870c9ee4b011fdb66b100275c583a3dc2e5884af31a4819f4b484ef839253fb
                          SHA512:e1beadb41cf88827b33b607c05c30db24d8066238a64031c5b8a1ad8310ee582e988b175512deddedcf84885a73ccef736104fb65f757194bda1eabf43648905
                          SSDEEP:6144:o8RFsUOLYDm0ZnDVd7skTpd9qLS5VAsslKsbl0XC1Ipn3GcG:o8RFsSDmAnHVdsKKoDKIpn2c
                          TLSH:3DC4B20CFE81F804DE1A3DB7CFE911004B7165C1AE1296863169AFFD8B6637259E267C
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...oA............"...0..|............... ........@.. ....................................@................................
                          Icon Hash:90cececece8e8eb0
                          Entrypoint:0x489ade
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0xF5FE416F [Wed Oct 13 03:20:15 2100 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x89a8c0x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x8a0000x596.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x8c0000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000x87ae40x87c00bd74df3307839ee12353c8a0c15892bbFalse0.40618885244014735data5.317887837129265IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0x8a0000x5960x600757bb0ae9db13f8eddbcbc4febdd91d5False0.4127604166666667data4.028920590135457IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x8c0000xc0x200167380b7d8fffc44240583be92b1d0f6False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_VERSION0x8a0a00x30cdata0.4269230769230769
                          RT_MANIFEST0x8a3ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2025-01-07T15:42:59.910159+01002058998ET MALWARE Sheet RAT CnC Checkin1192.168.2.449731147.185.221.2448428TCP
                          2025-01-07T15:42:59.910159+01002058998ET MALWARE Sheet RAT CnC Checkin1192.168.2.450507147.185.221.2448428TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 7, 2025 15:42:59.951035976 CET4973148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:42:59.955806017 CET4842849731147.185.221.24192.168.2.4
                          Jan 7, 2025 15:42:59.955878973 CET4973148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:07.875499964 CET4973148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:07.875500917 CET4973148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:07.880367041 CET4842849731147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:07.880397081 CET4842849731147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:07.880496979 CET4842849731147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:21.325150013 CET4842849731147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:21.325216055 CET4973148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:21.331805944 CET4973148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:21.336683035 CET4842849731147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:21.606108904 CET4974248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:21.610901117 CET4842849742147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:21.611023903 CET4974248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:21.675756931 CET4974248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:21.675952911 CET4974248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:21.681368113 CET4842849742147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:21.681655884 CET4842849742147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:21.681668043 CET4842849742147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:37.105941057 CET4974248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:37.110749960 CET4842849742147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:37.110821009 CET4974248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:37.115586996 CET4842849742147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:43.011276007 CET4842849742147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:43.011372089 CET4974248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:43.011919022 CET4974248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:43.016683102 CET4842849742147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:43.184137106 CET4974348428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:43.188965082 CET4842849743147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:43.189070940 CET4974348428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:43.190532923 CET5023653192.168.2.4162.159.36.2
                          Jan 7, 2025 15:43:43.195411921 CET5350236162.159.36.2192.168.2.4
                          Jan 7, 2025 15:43:43.195509911 CET5023653192.168.2.4162.159.36.2
                          Jan 7, 2025 15:43:43.200370073 CET5350236162.159.36.2192.168.2.4
                          Jan 7, 2025 15:43:43.241061926 CET4974348428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:43.241091967 CET4974348428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:43.245816946 CET4842849743147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:43.245837927 CET4842849743147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:43.245955944 CET4842849743147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:43.715095997 CET5023653192.168.2.4162.159.36.2
                          Jan 7, 2025 15:43:43.720047951 CET5350236162.159.36.2192.168.2.4
                          Jan 7, 2025 15:43:43.720118046 CET5023653192.168.2.4162.159.36.2
                          Jan 7, 2025 15:43:57.293545961 CET4974348428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:57.298460960 CET4842849743147.185.221.24192.168.2.4
                          Jan 7, 2025 15:43:57.298512936 CET4974348428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:43:57.303275108 CET4842849743147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:04.573720932 CET4842849743147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:04.573781967 CET4974348428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:04.574376106 CET4974348428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:04.579121113 CET4842849743147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:04.637229919 CET5029048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:04.642052889 CET4842850290147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:04.642162085 CET5029048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:04.693608046 CET5029048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:04.693655014 CET5029048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:04.698453903 CET4842850290147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:04.698465109 CET4842850290147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:04.698596954 CET4842850290147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:18.341375113 CET5029048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:18.346123934 CET4842850290147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:18.349858999 CET5029048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:18.354651928 CET4842850290147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:26.012443066 CET4842850290147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:26.012540102 CET5029048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:26.013314009 CET5029048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:26.014362097 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:26.018058062 CET4842850290147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:26.019171953 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:26.019236088 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:26.200573921 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:26.200671911 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:26.205390930 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:26.205432892 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:26.205645084 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:28.371330023 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:28.376177073 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:28.376346111 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:28.381236076 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:29.030920029 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:29.035794973 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:29.035851002 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:29.040667057 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:41.136560917 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:41.142647028 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:41.142707109 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:41.149244070 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:45.418081999 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:45.422957897 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:45.423012018 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:45.427840948 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:45.785828114 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:45.790821075 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:45.790889978 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:45.795730114 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:47.386166096 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:47.386310101 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:47.386956930 CET5042148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:47.387785912 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:47.391691923 CET4842850421147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:47.392601967 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:47.392678022 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:47.537578106 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:47.537684917 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:47.542516947 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:47.542532921 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:47.542546034 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:49.746092081 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:49.751028061 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:49.751179934 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:49.756009102 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:49.953116894 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:49.958041906 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:49.958359957 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:49.963180065 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:51.621057987 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:51.625943899 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:51.626009941 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:51.630822897 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:51.879841089 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:51.884706020 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:51.884851933 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:51.889662027 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:54.044205904 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:54.049113035 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:54.049221039 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:54.054011106 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:54.223869085 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:54.228792906 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:54.228934050 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:54.233688116 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:54.855400085 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:54.860266924 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:54.860318899 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:54.865107059 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:55.055114031 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:55.059981108 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:44:55.060051918 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:44:55.064872026 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:08.378671885 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:08.383583069 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:08.384222984 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:08.389039993 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:08.776398897 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:08.776456118 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:08.777007103 CET5050648428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:08.778004885 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:08.781930923 CET4842850506147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:08.782783031 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:08.782927036 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:08.967895985 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:08.967969894 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:08.972846985 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:08.972865105 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:08.972960949 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:11.465087891 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:11.469841957 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:11.469890118 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:11.474678993 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:11.686455965 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:11.691339016 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:11.692148924 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:11.696943998 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:23.964930058 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:23.969784975 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:23.969949007 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:23.975280046 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:29.543282032 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:29.548146963 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:29.548212051 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:29.553006887 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:29.833517075 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:29.838531971 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:29.838618994 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:29.843480110 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:30.152086973 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:30.152285099 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:30.158137083 CET5050748428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:30.158185005 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:30.163021088 CET4842850507147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:30.163036108 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:30.163114071 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:30.275777102 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:30.275777102 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:30.280724049 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:30.280738115 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:30.280817032 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:35.653959990 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:35.658840895 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:35.664092064 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:35.668924093 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:35.973912001 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:35.978796005 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:35.979296923 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:35.984133959 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:46.136861086 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:46.141638041 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:46.141757965 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:46.146650076 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:46.334001064 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:46.338799953 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:46.342113972 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:46.347008944 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:51.528987885 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:51.529057026 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:51.529519081 CET5050848428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:51.530680895 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:51.534276962 CET4842850508147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:51.535598993 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:51.535682917 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:51.689804077 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:51.689804077 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:45:51.694648027 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:51.694659948 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:45:51.694672108 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:04.902666092 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:04.907623053 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:04.907675982 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:04.912533998 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:05.386888981 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:05.391750097 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:05.391844988 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:05.396648884 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:05.512546062 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:05.517395973 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:05.517565012 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:05.522351027 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:06.230545044 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:06.235755920 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:06.235814095 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:06.240624905 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:06.570039988 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:06.574866056 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:06.578175068 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:06.583009958 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:06.918287992 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:06.923197985 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:06.923243046 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:06.928014994 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:07.118407965 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:07.124587059 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:07.124645948 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:07.130731106 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:12.918356895 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:12.918519020 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:12.921888113 CET5050948428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:12.922740936 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:12.926723957 CET4842850509147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:12.927596092 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:12.927858114 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:13.050280094 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:13.050415039 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:13.055293083 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:13.055310011 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:13.055330038 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:16.168507099 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:16.173896074 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:16.173949957 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:16.179236889 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:16.330456972 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:16.335410118 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:16.335464001 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:16.340290070 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:28.168119907 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:28.172995090 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:28.173041105 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:28.177753925 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:28.354734898 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:28.359605074 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:28.359664917 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:28.364442110 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:29.121397018 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:29.126295090 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:29.126377106 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:29.131119967 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:29.317857981 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:29.322763920 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:29.324364901 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:29.329165936 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:30.105706930 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:30.110651016 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:30.110699892 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:30.115478992 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:30.279242039 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:30.284080982 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:30.284141064 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:30.288965940 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:34.324896097 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:34.324980974 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:34.325381994 CET5051048428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:34.326256037 CET5051148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:34.330147982 CET4842850510147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:34.331089973 CET4842850511147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:34.331166983 CET5051148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:34.457176924 CET5051148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:34.457226038 CET5051148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:34.462013960 CET4842850511147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:34.462027073 CET4842850511147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:34.462096930 CET4842850511147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:48.855746984 CET5051148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:48.860675097 CET4842850511147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:48.861000061 CET5051148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:48.865746975 CET4842850511147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:55.705144882 CET4842850511147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:55.706137896 CET5051148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:55.712263107 CET5051148428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:55.713083029 CET5051248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:55.717084885 CET4842850511147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:55.717886925 CET4842850512147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:55.718075991 CET5051248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:55.927561045 CET5051248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:55.927767038 CET5051248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:46:55.932460070 CET4842850512147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:55.932583094 CET4842850512147.185.221.24192.168.2.4
                          Jan 7, 2025 15:46:55.932672977 CET4842850512147.185.221.24192.168.2.4
                          Jan 7, 2025 15:47:05.355487108 CET5051248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:47:05.360428095 CET4842850512147.185.221.24192.168.2.4
                          Jan 7, 2025 15:47:05.360495090 CET5051248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:47:05.365299940 CET4842850512147.185.221.24192.168.2.4
                          Jan 7, 2025 15:47:05.418127060 CET5051248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:47:05.422940969 CET4842850512147.185.221.24192.168.2.4
                          Jan 7, 2025 15:47:05.422998905 CET5051248428192.168.2.4147.185.221.24
                          Jan 7, 2025 15:47:05.427772045 CET4842850512147.185.221.24192.168.2.4
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 7, 2025 15:42:59.910159111 CET5127053192.168.2.41.1.1.1
                          Jan 7, 2025 15:42:59.922854900 CET53512701.1.1.1192.168.2.4
                          Jan 7, 2025 15:43:43.190077066 CET5352055162.159.36.2192.168.2.4
                          Jan 7, 2025 15:43:43.765737057 CET53595601.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 7, 2025 15:42:59.910159111 CET192.168.2.41.1.1.10x196Standard query (0)co-updated.gl.at.ply.ggA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 7, 2025 15:42:59.922854900 CET1.1.1.1192.168.2.40x196No error (0)co-updated.gl.at.ply.gg147.185.221.24A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:09:42:58
                          Start date:07/01/2025
                          Path:C:\Users\user\Desktop\loader.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\loader.exe"
                          Imagebase:0x570000
                          File size:558'592 bytes
                          MD5 hash:0FD9836E2142BC85CED43D8316650B6C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:15%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:100%
                            Total number of Nodes:3
                            Total number of Limit Nodes:0
                            execution_graph 16577 7ffd9b7ce9ad 16578 7ffd9b7ce9bf NtProtectVirtualMemory 16577->16578 16580 7ffd9b7cea95 16578->16580
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID: -O_H$FO_H
                            • API String ID: 0-3879763109
                            • Opcode ID: ebbea68da520b787d1a5f881ea5a3419ac468feab0fab9a1b985ed226cc826dd
                            • Instruction ID: 548e87f4829d11a1b6108a148abf218c699ee07786f946ba5d61528c68efbdcc
                            • Opcode Fuzzy Hash: ebbea68da520b787d1a5f881ea5a3419ac468feab0fab9a1b985ed226cc826dd
                            • Instruction Fuzzy Hash: DEA21921F0D64A5BFB68B76888666B832C19F94304F55067DD05DC73FBEE1CB90A8392

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 702 7ffd9b7cbae8-7ffd9b7cbaf1 703 7ffd9b7cbab7-7ffd9b7cbabd 702->703 704 7ffd9b7cbaf3 702->704 707 7ffd9b7cba83-7ffd9b7cbaa7 call 7ffd9b7cbae8 703->707 708 7ffd9b7cbabf 703->708 705 7ffd9b7cbaf5-7ffd9b7cbb02 704->705 706 7ffd9b7cbb6d-7ffd9b7cbb85 704->706 711 7ffd9b7cbb03 705->711 709 7ffd9b7cbb87 706->709 710 7ffd9b7cbb88-7ffd9b7cbb99 706->710 721 7ffd9b7cbad1-7ffd9b7cbadb 707->721 732 7ffd9b7cbaa9 707->732 713 7ffd9b7cbb39-7ffd9b7cbb4c 708->713 714 7ffd9b7cbac1-7ffd9b7cbace 708->714 709->710 715 7ffd9b7cbb9b 710->715 716 7ffd9b7cbb9c-7ffd9b7cbbad 710->716 717 7ffd9b7cbb05-7ffd9b7cbb0b 711->717 719 7ffd9b7cbb4e-7ffd9b7cbb4f 713->719 720 7ffd9b7cbacf 714->720 715->716 722 7ffd9b7cbbaf 716->722 723 7ffd9b7cbbb0-7ffd9b7cbbcc 716->723 724 7ffd9b7cbb23-7ffd9b7cbb26 717->724 725 7ffd9b7cbb0d-7ffd9b7cbb1e 717->725 727 7ffd9b7cbb50-7ffd9b7cbb6c 719->727 720->721 721->717 728 7ffd9b7cbadd 721->728 722->723 729 7ffd9b7cbc16-7ffd9b7cbc25 call 7ffd9b7c3440 723->729 730 7ffd9b7cbbce-7ffd9b7cbbe1 723->730 724->727 733 7ffd9b7cbb28 724->733 725->724 727->706 728->711 734 7ffd9b7cbadf-7ffd9b7cbae7 728->734 742 7ffd9b7cbc37-7ffd9b7cbc3b 729->742 743 7ffd9b7cbc27-7ffd9b7cbc33 729->743 735 7ffd9b7cbbe6-7ffd9b7cbbed 730->735 732->720 736 7ffd9b7cbaab-7ffd9b7cbab3 732->736 733->719 737 7ffd9b7cbb2a-7ffd9b7cbb32 733->737 740 7ffd9b7cbc0b-7ffd9b7cbc14 735->740 741 7ffd9b7cbbef-7ffd9b7cbbf6 735->741 740->729 744 7ffd9b7cbbf8 741->744 745 7ffd9b7cbbfd-7ffd9b7cbc04 741->745 746 7ffd9b7cbc3c 742->746 747 7ffd9b7cbcb0-7ffd9b7cbcb4 742->747 753 7ffd9b7cbc45-7ffd9b7cbc54 call 7ffd9b7ca750 743->753 754 7ffd9b7cbc35 743->754 744->745 745->735 748 7ffd9b7cbc06 745->748 750 7ffd9b7cbc9a-7ffd9b7cbca0 call 7ffd9b7ca800 746->750 751 7ffd9b7cbc3d-7ffd9b7cbc42 746->751 752 7ffd9b7cbcc3-7ffd9b7cbcd0 747->752 748->752 756 7ffd9b7cbca5-7ffd9b7cbcaf call 7ffd9b7cbcd1 750->756 751->753 759 7ffd9b7cbc59-7ffd9b7cbc67 call 7ffd9b7cb310 753->759 754->742 756->747 762 7ffd9b7cbc69-7ffd9b7cbc72 call 7ffd9b7ca7f0 759->762 763 7ffd9b7cbc77-7ffd9b7cbc98 759->763 762->763 763->750
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID: @
                            • API String ID: 0-2766056989
                            • Opcode ID: 9c313108ed593f13489f6df3cbec5cadcc4524fe59b317eb1ce5020abc400918
                            • Instruction ID: ad06d71700a3bf7d7dd4ec648ddc988c8c002278db207509508fadbc736a128e
                            • Opcode Fuzzy Hash: 9c313108ed593f13489f6df3cbec5cadcc4524fe59b317eb1ce5020abc400918
                            • Instruction Fuzzy Hash: 6F62B161E0E78E1FE766B77848651B53BA09F56314F0642FED088C73F7E91C690A8392

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 768 7ffd9b7ce9ad-7ffd9b7cea93 NtProtectVirtualMemory 773 7ffd9b7cea9b-7ffd9b7ceac6 768->773 774 7ffd9b7cea95 768->774 774->773
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID: MemoryProtectVirtual
                            • String ID:
                            • API String ID: 2706961497-0
                            • Opcode ID: 8105e43e93c11d210d9f05fd6ed123234297ae71ea379db44d0037ce35440068
                            • Instruction ID: 69f2cee512fb26ca13c6d481c0f94acfe2e99640db1d19b8fb267f9230e1c665
                            • Opcode Fuzzy Hash: 8105e43e93c11d210d9f05fd6ed123234297ae71ea379db44d0037ce35440068
                            • Instruction Fuzzy Hash: E131A631A1CB4C8FDB589B5C98166ED7BE1EB99310F0042AFE049D3296DB75A8458BC2
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 17840a273f72e979474e32f421e592cc4e92097a8893bf232a70645921a99f6c
                            • Instruction ID: 90ca863d1978372b0863b1a2b20729b4aaaa0f8b52c4c11ce278921e63443375
                            • Opcode Fuzzy Hash: 17840a273f72e979474e32f421e592cc4e92097a8893bf232a70645921a99f6c
                            • Instruction Fuzzy Hash: CD62EA21E0E78E5FEBB6A6A448751B87BA0DF56301F1603BEC44DC72F3D91C6A498352
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e5d8f26c357a4852a424d0e88278eb19a86ff58342965248ad4f0591c3d8ead7
                            • Instruction ID: d8887b0130c501ced27ed3e4d078b7018f0a5142287e107f4b8ed865d6a7710e
                            • Opcode Fuzzy Hash: e5d8f26c357a4852a424d0e88278eb19a86ff58342965248ad4f0591c3d8ead7
                            • Instruction Fuzzy Hash: D262C951E0E7CA1FE726B6A44C651B53BA0DF12314F5A02FED099CB2F7ED1C690A8352

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2339 7ffd9b7d10d8-7ffd9b7d1e10 2341 7ffd9b7d1e19 2339->2341 2342 7ffd9b7d1e12-7ffd9b7d1e17 2339->2342 2343 7ffd9b7d1e1e-7ffd9b7d1e23 2341->2343 2342->2341 2342->2343 2343->2342 2344 7ffd9b7d1e25-7ffd9b7d1e5e 2343->2344 2350 7ffd9b7d1e6b-7ffd9b7d1e74 2344->2350 2351 7ffd9b7d1e60 2344->2351 2354 7ffd9b7d1e76-7ffd9b7d1eb0 2350->2354 2351->2350 2353 7ffd9b7d1e62-7ffd9b7d1e64 2351->2353 2353->2354 2355 7ffd9b7d1e66 2353->2355 2359 7ffd9b7d1eb9 2354->2359 2355->2350 2360 7ffd9b7d1ebe-7ffd9b7d1ec3 2359->2360 2361 7ffd9b7d1ec5-7ffd9b7d1ef0 2360->2361 2362 7ffd9b7d1eb2-7ffd9b7d1eb7 2360->2362 2365 7ffd9b7d1efa 2361->2365 2362->2359 2362->2360 2366 7ffd9b7d1eff-7ffd9b7d1f05 2365->2366 2367 7ffd9b7d1f07-7ffd9b7d1f30 2366->2367 2368 7ffd9b7d1ef2-7ffd9b7d1ef8 2366->2368 2371 7ffd9b7d1f39 2367->2371 2368->2365 2368->2366 2372 7ffd9b7d1f3e-7ffd9b7d1f43 2371->2372 2373 7ffd9b7d1f45-7ffd9b7d1f70 2372->2373 2374 7ffd9b7d1f32-7ffd9b7d1f37 2372->2374 2378 7ffd9b7d1f7a 2373->2378 2374->2371 2374->2372 2379 7ffd9b7d1f7f-7ffd9b7d1f85 2378->2379 2380 7ffd9b7d1f87-7ffd9b7d1f93 2379->2380 2381 7ffd9b7d1f72-7ffd9b7d1f78 2379->2381 2383 7ffd9b7d1f95-7ffd9b7d1faa 2380->2383 2384 7ffd9b7d1fae 2380->2384 2381->2378 2381->2379 2385 7ffd9b7d1fb0-7ffd9b7d1fbe 2383->2385 2384->2385 2387 7ffd9b7d1fcb-7ffd9b7d1fcd 2385->2387 2388 7ffd9b7d1fc0 2385->2388 2389 7ffd9b7d1ffd-7ffd9b7d1ffe 2387->2389 2390 7ffd9b7d1fcf-7ffd9b7d1fd4 2387->2390 2388->2387 2391 7ffd9b7d1fc2-7ffd9b7d1fc4 2388->2391 2393 7ffd9b7d1fff-7ffd9b7d2012 2389->2393 2392 7ffd9b7d1fd6-7ffd9b7d1ffc 2390->2392 2391->2392 2394 7ffd9b7d1fc6 2391->2394 2392->2393 2398 7ffd9b7d2014-7ffd9b7d201e 2393->2398 2394->2387 2400 7ffd9b7d202b-7ffd9b7d202d 2398->2400 2401 7ffd9b7d2020 2398->2401 2403 7ffd9b7d205d-7ffd9b7d2078 2400->2403 2404 7ffd9b7d202f-7ffd9b7d2034 2400->2404 2401->2400 2402 7ffd9b7d2022-7ffd9b7d2024 2401->2402 2405 7ffd9b7d2036-7ffd9b7d205b 2402->2405 2406 7ffd9b7d2026 2402->2406 2409 7ffd9b7d207a 2403->2409 2410 7ffd9b7d207f-7ffd9b7d20b0 2403->2410 2404->2405 2405->2403 2406->2400 2409->2410 2416 7ffd9b7d20b9 2410->2416 2417 7ffd9b7d20be-7ffd9b7d20c3 2416->2417 2418 7ffd9b7d20c5-7ffd9b7d2119 2417->2418 2419 7ffd9b7d20b2-7ffd9b7d20b7 2417->2419 2425 7ffd9b7d212b 2418->2425 2426 7ffd9b7d211b 2418->2426 2419->2416 2419->2417 2428 7ffd9b7d212d-7ffd9b7d214c call 7ffd9b7d11b8 2425->2428 2429 7ffd9b7d215e-7ffd9b7d2160 2425->2429 2427 7ffd9b7d2120-7ffd9b7d2122 2426->2427 2432 7ffd9b7d2152-7ffd9b7d2157 2427->2432 2433 7ffd9b7d2124-7ffd9b7d2129 2427->2433 2443 7ffd9b7d2151 2428->2443 2430 7ffd9b7d2162-7ffd9b7d2167 2429->2430 2431 7ffd9b7d2190-7ffd9b7d21a5 2429->2431 2435 7ffd9b7d2169 2430->2435 2437 7ffd9b7d2174-7ffd9b7d2176 2430->2437 2440 7ffd9b7d21a6-7ffd9b7d21a9 2431->2440 2432->2435 2436 7ffd9b7d2159 2432->2436 2433->2425 2433->2429 2435->2437 2439 7ffd9b7d216b-7ffd9b7d216d 2435->2439 2436->2429 2437->2440 2441 7ffd9b7d2178-7ffd9b7d217d 2437->2441 2444 7ffd9b7d217f 2439->2444 2445 7ffd9b7d216f 2439->2445 2446 7ffd9b7d21ac-7ffd9b7d21ce call 7ffd9b7d21dd 2440->2446 2441->2427 2441->2444 2443->2432 2444->2427 2447 7ffd9b7d2181-7ffd9b7d218f 2444->2447 2445->2437 2451 7ffd9b7d21f8-7ffd9b7d2200 2446->2451 2452 7ffd9b7d21d0 2446->2452 2447->2431 2455 7ffd9b7d2218-7ffd9b7d221b 2451->2455 2456 7ffd9b7d2202-7ffd9b7d2213 2451->2456 2453 7ffd9b7d21f6-7ffd9b7d21f7 2452->2453 2454 7ffd9b7d21d2-7ffd9b7d21e6 2452->2454 2453->2451 2454->2446 2470 7ffd9b7d21e8 2454->2470 2458 7ffd9b7d2245-7ffd9b7d225d 2455->2458 2459 7ffd9b7d221d 2455->2459 2456->2455 2461 7ffd9b7d2262-7ffd9b7d2265 2458->2461 2462 7ffd9b7d2243 2459->2462 2463 7ffd9b7d221f-7ffd9b7d2227 2459->2463 2464 7ffd9b7d2267 2461->2464 2465 7ffd9b7d2268-7ffd9b7d2279 2461->2465 2462->2458 2464->2465 2467 7ffd9b7d227b 2465->2467 2468 7ffd9b7d227c-7ffd9b7d229e 2465->2468 2467->2468 2471 7ffd9b7d22a3-7ffd9b7d22a8 2468->2471 2470->2461 2472 7ffd9b7d21ea-7ffd9b7d21f3 2470->2472 2473 7ffd9b7d22aa 2471->2473 2474 7ffd9b7d22af-7ffd9b7d22b4 2471->2474 2472->2453 2473->2474 2474->2471 2475 7ffd9b7d22b6-7ffd9b7d22ba 2474->2475 2476 7ffd9b7d22bc-7ffd9b7d22c0 2475->2476 2477 7ffd9b7d22c5-7ffd9b7d22ca 2475->2477 2476->2477 2478 7ffd9b7d22c2 2476->2478 2478->2477
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9c96fa22535d1b7b717eec278a6684ff650526171fd66ff601c456fae8cd92b8
                            • Instruction ID: cd73d2463082c74aaded250422194e40da7162bb12be3f229a98d25fecc326fe
                            • Opcode Fuzzy Hash: 9c96fa22535d1b7b717eec278a6684ff650526171fd66ff601c456fae8cd92b8
                            • Instruction Fuzzy Hash: 8BF17361E0F3CA0FE77296A488756643BA09F96391F0A47FAD44CCB4F3D91D690E8352

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2600 7ffd9b7c7236-7ffd9b7c7243 2601 7ffd9b7c7245-7ffd9b7c724d 2600->2601 2602 7ffd9b7c724e-7ffd9b7c7317 2600->2602 2601->2602 2606 7ffd9b7c7319-7ffd9b7c7322 2602->2606 2607 7ffd9b7c7383 2602->2607 2606->2607 2608 7ffd9b7c7324-7ffd9b7c7330 2606->2608 2609 7ffd9b7c7385-7ffd9b7c73aa 2607->2609 2610 7ffd9b7c7369-7ffd9b7c7381 2608->2610 2611 7ffd9b7c7332-7ffd9b7c7344 2608->2611 2616 7ffd9b7c7416 2609->2616 2617 7ffd9b7c73ac-7ffd9b7c73b5 2609->2617 2610->2609 2612 7ffd9b7c7348-7ffd9b7c735b 2611->2612 2613 7ffd9b7c7346 2611->2613 2612->2612 2615 7ffd9b7c735d-7ffd9b7c7365 2612->2615 2613->2612 2615->2610 2619 7ffd9b7c7418-7ffd9b7c74c0 2616->2619 2617->2616 2618 7ffd9b7c73b7-7ffd9b7c73c3 2617->2618 2620 7ffd9b7c73c5-7ffd9b7c73d7 2618->2620 2621 7ffd9b7c73fc-7ffd9b7c7414 2618->2621 2630 7ffd9b7c752e 2619->2630 2631 7ffd9b7c74c2-7ffd9b7c74cc 2619->2631 2622 7ffd9b7c73db-7ffd9b7c73ee 2620->2622 2623 7ffd9b7c73d9 2620->2623 2621->2619 2622->2622 2625 7ffd9b7c73f0-7ffd9b7c73f8 2622->2625 2623->2622 2625->2621 2633 7ffd9b7c7530-7ffd9b7c7559 2630->2633 2631->2630 2632 7ffd9b7c74ce-7ffd9b7c74db 2631->2632 2634 7ffd9b7c74dd-7ffd9b7c74ef 2632->2634 2635 7ffd9b7c7514-7ffd9b7c752c 2632->2635 2640 7ffd9b7c755b-7ffd9b7c7566 2633->2640 2641 7ffd9b7c75c3 2633->2641 2636 7ffd9b7c74f3-7ffd9b7c7506 2634->2636 2637 7ffd9b7c74f1 2634->2637 2635->2633 2636->2636 2639 7ffd9b7c7508-7ffd9b7c7510 2636->2639 2637->2636 2639->2635 2640->2641 2643 7ffd9b7c7568-7ffd9b7c7576 2640->2643 2642 7ffd9b7c75c5-7ffd9b7c7656 2641->2642 2651 7ffd9b7c765c-7ffd9b7c766b 2642->2651 2644 7ffd9b7c7578-7ffd9b7c758a 2643->2644 2645 7ffd9b7c75af-7ffd9b7c75c1 2643->2645 2647 7ffd9b7c758c 2644->2647 2648 7ffd9b7c758e-7ffd9b7c75a1 2644->2648 2645->2642 2647->2648 2648->2648 2649 7ffd9b7c75a3-7ffd9b7c75ab 2648->2649 2649->2645 2652 7ffd9b7c766d 2651->2652 2653 7ffd9b7c7673-7ffd9b7c76d8 call 7ffd9b7c76f4 2651->2653 2652->2653 2660 7ffd9b7c76da 2653->2660 2661 7ffd9b7c76df-7ffd9b7c76f3 2653->2661 2660->2661
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2b570be045acbd60cb3869f0594d4a8c8969bcf7a672611f07fb0bd8a3245c8b
                            • Instruction ID: fd44a24ca139146eef2a34d06b412271574e5aba6113ac192587b1c9700922c9
                            • Opcode Fuzzy Hash: 2b570be045acbd60cb3869f0594d4a8c8969bcf7a672611f07fb0bd8a3245c8b
                            • Instruction Fuzzy Hash: 28F18230A09A8D9FEBA8EF28C8557F937D1FB54310F14426EE85DC72A5DF3499418B82

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2662 7ffd9b7c7fe2-7ffd9b7c7fef 2663 7ffd9b7c7ffa-7ffd9b7c80c7 2662->2663 2664 7ffd9b7c7ff1-7ffd9b7c7ff9 2662->2664 2668 7ffd9b7c80c9-7ffd9b7c80d2 2663->2668 2669 7ffd9b7c8133 2663->2669 2664->2663 2668->2669 2670 7ffd9b7c80d4-7ffd9b7c80e0 2668->2670 2671 7ffd9b7c8135-7ffd9b7c815a 2669->2671 2672 7ffd9b7c8119-7ffd9b7c8131 2670->2672 2673 7ffd9b7c80e2-7ffd9b7c80f4 2670->2673 2677 7ffd9b7c815c-7ffd9b7c8165 2671->2677 2678 7ffd9b7c81c6 2671->2678 2672->2671 2674 7ffd9b7c80f6 2673->2674 2675 7ffd9b7c80f8-7ffd9b7c810b 2673->2675 2674->2675 2675->2675 2679 7ffd9b7c810d-7ffd9b7c8115 2675->2679 2677->2678 2680 7ffd9b7c8167-7ffd9b7c8173 2677->2680 2681 7ffd9b7c81c8-7ffd9b7c81ed 2678->2681 2679->2672 2682 7ffd9b7c81ac-7ffd9b7c81c4 2680->2682 2683 7ffd9b7c8175-7ffd9b7c8187 2680->2683 2688 7ffd9b7c825b 2681->2688 2689 7ffd9b7c81ef-7ffd9b7c81f9 2681->2689 2682->2681 2684 7ffd9b7c8189 2683->2684 2685 7ffd9b7c818b-7ffd9b7c819e 2683->2685 2684->2685 2685->2685 2687 7ffd9b7c81a0-7ffd9b7c81a8 2685->2687 2687->2682 2690 7ffd9b7c825d-7ffd9b7c828b 2688->2690 2689->2688 2691 7ffd9b7c81fb-7ffd9b7c8208 2689->2691 2698 7ffd9b7c82fb 2690->2698 2699 7ffd9b7c828d-7ffd9b7c8298 2690->2699 2692 7ffd9b7c820a-7ffd9b7c821c 2691->2692 2693 7ffd9b7c8241-7ffd9b7c8259 2691->2693 2695 7ffd9b7c821e 2692->2695 2696 7ffd9b7c8220-7ffd9b7c8233 2692->2696 2693->2690 2695->2696 2696->2696 2697 7ffd9b7c8235-7ffd9b7c823d 2696->2697 2697->2693 2701 7ffd9b7c82fd-7ffd9b7c83d5 2698->2701 2699->2698 2700 7ffd9b7c829a-7ffd9b7c82a8 2699->2700 2702 7ffd9b7c82aa-7ffd9b7c82bc 2700->2702 2703 7ffd9b7c82e1-7ffd9b7c82f9 2700->2703 2711 7ffd9b7c83db-7ffd9b7c83ea 2701->2711 2705 7ffd9b7c82be 2702->2705 2706 7ffd9b7c82c0-7ffd9b7c82d3 2702->2706 2703->2701 2705->2706 2706->2706 2708 7ffd9b7c82d5-7ffd9b7c82dd 2706->2708 2708->2703 2712 7ffd9b7c83ec 2711->2712 2713 7ffd9b7c83f2-7ffd9b7c8454 call 7ffd9b7c8470 2711->2713 2712->2713 2720 7ffd9b7c845b-7ffd9b7c846f 2713->2720 2721 7ffd9b7c8456 2713->2721 2721->2720
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0d25d8e4f6b4a72876d8db21c47ee4c5376eb519d92f39b9280cd69ff9e580f2
                            • Instruction ID: c5d287b18241f8b116b7e3557db1bf6e5d58e4035d00033cb7bb7289a6081a8e
                            • Opcode Fuzzy Hash: 0d25d8e4f6b4a72876d8db21c47ee4c5376eb519d92f39b9280cd69ff9e580f2
                            • Instruction Fuzzy Hash: C3E1A330A09A4E8FEBA8EF28C8557F977D1FB54310F05436ED84DC72A5DB74A9418781

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2722 7ffd9b7cc681-7ffd9b7cc683 2723 7ffd9b7cc684 2722->2723 2724 7ffd9b7cc6fd-7ffd9b7cc6ff 2722->2724 2727 7ffd9b7cc685-7ffd9b7cc686 2723->2727 2728 7ffd9b7cc6ae-7ffd9b7cc6b2 2723->2728 2725 7ffd9b7cc77c-7ffd9b7cc797 2724->2725 2726 7ffd9b7cc700 2724->2726 2740 7ffd9b7cc799 2725->2740 2741 7ffd9b7cc75d-7ffd9b7cc76e 2725->2741 2734 7ffd9b7cc701-7ffd9b7cc702 2726->2734 2735 7ffd9b7cc712-7ffd9b7cc716 2726->2735 2729 7ffd9b7cc6ac-7ffd9b7cc6ad 2727->2729 2730 7ffd9b7cc688-7ffd9b7cc68d 2727->2730 2732 7ffd9b7cc646-7ffd9b7cc651 2728->2732 2733 7ffd9b7cc6b4-7ffd9b7cc6b6 2728->2733 2729->2728 2736 7ffd9b7cc653-7ffd9b7cc65d 2732->2736 2737 7ffd9b7cc65f-7ffd9b7cc666 2732->2737 2742 7ffd9b7cc6c8 2733->2742 2743 7ffd9b7cc6b8 2733->2743 2744 7ffd9b7cc707-7ffd9b7cc709 2734->2744 2738 7ffd9b7cc639-7ffd9b7cc63b 2735->2738 2739 7ffd9b7cc71c-7ffd9b7cc721 2735->2739 2736->2737 2745 7ffd9b7cc6ca-7ffd9b7cc6e1 2736->2745 2748 7ffd9b7cc668 2737->2748 2749 7ffd9b7cc690 2737->2749 2755 7ffd9b7cc66b-7ffd9b7cc66f 2738->2755 2756 7ffd9b7cc63d-7ffd9b7cc642 2738->2756 2747 7ffd9b7cc723 2739->2747 2750 7ffd9b7cc79b-7ffd9b7cc7a8 2740->2750 2751 7ffd9b7cc813-7ffd9b7cc815 2740->2751 2742->2745 2746 7ffd9b7cc6f1-7ffd9b7cc6f3 2742->2746 2752 7ffd9b7cc6bd-7ffd9b7cc6bf 2743->2752 2753 7ffd9b7cc739-7ffd9b7cc745 2744->2753 2754 7ffd9b7cc70b 2744->2754 2745->2739 2787 7ffd9b7cc6e3-7ffd9b7cc6e7 2745->2787 2746->2747 2762 7ffd9b7cc6f5-7ffd9b7cc6fa 2746->2762 2770 7ffd9b7cc725 2747->2770 2771 7ffd9b7cc74d-7ffd9b7cc756 2747->2771 2760 7ffd9b7cc66a 2748->2760 2761 7ffd9b7cc68e 2748->2761 2768 7ffd9b7cc692-7ffd9b7cc697 2749->2768 2769 7ffd9b7cc6c0-7ffd9b7cc6c6 2749->2769 2763 7ffd9b7cc7ba 2750->2763 2764 7ffd9b7cc7aa-7ffd9b7cc7af 2750->2764 2766 7ffd9b7cc845-7ffd9b7cc84e call 7ffd9b7d0909 2751->2766 2767 7ffd9b7cc817-7ffd9b7cc81c 2751->2767 2752->2769 2773 7ffd9b7cc6ef-7ffd9b7cc6f0 2752->2773 2772 7ffd9b7cc74b 2753->2772 2765 7ffd9b7cc70f-7ffd9b7cc710 2754->2765 2757 7ffd9b7cc644 2756->2757 2758 7ffd9b7cc670-7ffd9b7cc672 2756->2758 2757->2732 2757->2758 2779 7ffd9b7cc6a2-7ffd9b7cc6a6 2758->2779 2780 7ffd9b7cc674-7ffd9b7cc679 2758->2780 2760->2755 2761->2749 2762->2744 2778 7ffd9b7cc6fc 2762->2778 2774 7ffd9b7cc7bc 2763->2774 2775 7ffd9b7cc7fd-7ffd9b7cc806 2763->2775 2764->2775 2765->2738 2781 7ffd9b7cc711 2765->2781 2798 7ffd9b7cc853-7ffd9b7cc8a0 call 7ffd9b7d0921 2766->2798 2782 7ffd9b7cc7b1-7ffd9b7cc7b3 2767->2782 2783 7ffd9b7cc81e 2767->2783 2768->2752 2784 7ffd9b7cc699 2768->2784 2769->2742 2769->2746 2770->2772 2785 7ffd9b7cc727-7ffd9b7cc72c 2770->2785 2771->2741 2772->2771 2774->2775 2786 7ffd9b7cc7be-7ffd9b7cc7c4 2774->2786 2775->2751 2800 7ffd9b7cc808 2775->2800 2778->2724 2778->2744 2779->2733 2793 7ffd9b7cc6a8 2779->2793 2780->2761 2790 7ffd9b7cc67b 2780->2790 2781->2735 2794 7ffd9b7cc7b5 2782->2794 2795 7ffd9b7cc7e3 2782->2795 2783->2782 2791 7ffd9b7cc820-7ffd9b7cc829 2783->2791 2784->2752 2792 7ffd9b7cc69b-7ffd9b7cc69c 2784->2792 2796 7ffd9b7cc7c5 2786->2796 2787->2781 2797 7ffd9b7cc6e9 2787->2797 2790->2761 2801 7ffd9b7cc67d 2790->2801 2791->2798 2802 7ffd9b7cc82b 2791->2802 2792->2779 2793->2729 2794->2763 2795->2796 2799 7ffd9b7cc7e7-7ffd9b7cc7f6 2795->2799 2803 7ffd9b7cc7c7-7ffd9b7cc7e2 call 7ffd9b7ca860 2796->2803 2797->2765 2804 7ffd9b7cc6eb-7ffd9b7cc6ee 2797->2804 2815 7ffd9b7cc8b2-7ffd9b7cc8c2 2798->2815 2816 7ffd9b7cc8a2-7ffd9b7cc8a9 2798->2816 2799->2800 2814 7ffd9b7cc7f8 2799->2814 2800->2751 2806 7ffd9b7cc80a-7ffd9b7cc80c 2800->2806 2801->2722 2807 7ffd9b7cc851 2802->2807 2808 7ffd9b7cc82d-7ffd9b7cc833 2802->2808 2803->2795 2804->2773 2806->2783 2812 7ffd9b7cc80e 2806->2812 2807->2798 2812->2751 2814->2775 2819 7ffd9b7cc8c4-7ffd9b7cc8fe 2815->2819 2817 7ffd9b7cc8ab-7ffd9b7cc8c2 2816->2817 2818 7ffd9b7cc907-7ffd9b7cc90c 2816->2818 2817->2819 2820 7ffd9b7cc966 2818->2820 2821 7ffd9b7cc90e-7ffd9b7cc925 2818->2821 2839 7ffd9b7cc910-7ffd9b7cc920 2819->2839 2840 7ffd9b7cc900-7ffd9b7cc90c 2819->2840 2824 7ffd9b7cc96d-7ffd9b7cc96f 2820->2824 2832 7ffd9b7cc927-7ffd9b7cc93c 2821->2832 2825 7ffd9b7cc981-7ffd9b7cc992 2824->2825 2826 7ffd9b7cc971-7ffd9b7cc978 2824->2826 2831 7ffd9b7cc994-7ffd9b7cc9c4 2825->2831 2829 7ffd9b7cc97a-7ffd9b7cc992 2826->2829 2830 7ffd9b7cc9d6-7ffd9b7cc9dc 2826->2830 2829->2831 2833 7ffd9b7cca36 2830->2833 2834 7ffd9b7cc9de-7ffd9b7cc9f5 2830->2834 2852 7ffd9b7cc9cc-7ffd9b7cc9ce 2831->2852 2841 7ffd9b7cc9b8-7ffd9b7cc9c4 2832->2841 2842 7ffd9b7cc93e-7ffd9b7cc961 2832->2842 2847 7ffd9b7cc9f7-7ffd9b7cca35 2834->2847 2850 7ffd9b7cc958-7ffd9b7cc961 2839->2850 2851 7ffd9b7cc922-7ffd9b7cc925 2839->2851 2840->2820 2840->2821 2841->2852 2860 7ffd9b7cc963 2842->2860 2847->2833 2850->2860 2851->2832 2855 7ffd9b7cc9e0-7ffd9b7cc9f5 2852->2855 2856 7ffd9b7cc9d0-7ffd9b7cc9dc 2852->2856 2855->2847 2856->2833 2856->2834 2860->2824
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f62dd440b1e1200b831a84c7637b0899ed334808ef971b42bfe2982aa39d42ff
                            • Instruction ID: c135e0d2f9050b047c44d98d59a822a2dc0f65a4d83c3ea7264e35469cd8da55
                            • Opcode Fuzzy Hash: f62dd440b1e1200b831a84c7637b0899ed334808ef971b42bfe2982aa39d42ff
                            • Instruction Fuzzy Hash: 4EE10962F0E64F5AFB65B6B498716B93BA0DF61300F1602BDC049D72F6EE1C690A43D1
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0162d6669991b53959d165dad16617a3c496355638644ed40636337a43a703af
                            • Instruction ID: 42976d5dc7d790f7f52bfc4aee231ba7728e846f11aa55cc5b6dc84f818799a2
                            • Opcode Fuzzy Hash: 0162d6669991b53959d165dad16617a3c496355638644ed40636337a43a703af
                            • Instruction Fuzzy Hash: C3D1B861F1E60F26FBB9B6788C6257631909F54309F56537CE40CC23FAED1CAA4642D2

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 3657 7ffd9b7c3440-7ffd9b7c344e 3658 7ffd9b7c3450 3657->3658 3659 7ffd9b7c3414-7ffd9b7c3428 3657->3659 3660 7ffd9b7c34ca 3658->3660 3661 7ffd9b7c3452-7ffd9b7c3467 3658->3661 3664 7ffd9b7c34d7-7ffd9b7c34d8 3660->3664 3665 7ffd9b7c34cc-7ffd9b7c34d0 3660->3665 3662 7ffd9b7c3479 3661->3662 3663 7ffd9b7c3469-7ffd9b7c346e 3661->3663 3666 7ffd9b7c34a4-7ffd9b7c34a6 3662->3666 3667 7ffd9b7c347b 3662->3667 3663->3666 3670 7ffd9b7c34d9 3664->3670 3671 7ffd9b7c3553-7ffd9b7c3558 3664->3671 3668 7ffd9b7c34e2 3665->3668 3669 7ffd9b7c34d2 3665->3669 3675 7ffd9b7c34d6 3666->3675 3680 7ffd9b7c34a8-7ffd9b7c34ad 3666->3680 3667->3666 3674 7ffd9b7c347d-7ffd9b7c3488 3667->3674 3678 7ffd9b7c34e4-7ffd9b7c34e6 3668->3678 3679 7ffd9b7c34b1-7ffd9b7c34b4 3668->3679 3669->3675 3676 7ffd9b7c34da-7ffd9b7c34e0 3670->3676 3677 7ffd9b7c3509-7ffd9b7c350b 3670->3677 3672 7ffd9b7c355c-7ffd9b7c3565 3671->3672 3673 7ffd9b7c355a 3671->3673 3698 7ffd9b7c3567 3672->3698 3699 7ffd9b7c3575-7ffd9b7c3576 3672->3699 3673->3672 3684 7ffd9b7c3582-7ffd9b7c3586 3673->3684 3686 7ffd9b7c348e-7ffd9b7c3499 3674->3686 3687 7ffd9b7c3654-7ffd9b7c3659 3674->3687 3675->3664 3676->3668 3676->3678 3683 7ffd9b7c350c-7ffd9b7c350d 3677->3683 3688 7ffd9b7c34e8-7ffd9b7c34ed 3678->3688 3689 7ffd9b7c3516 3678->3689 3681 7ffd9b7c34b6-7ffd9b7c34b8 3679->3681 3682 7ffd9b7c34f1-7ffd9b7c34f4 3679->3682 3690 7ffd9b7c34bf-7ffd9b7c34c1 3680->3690 3691 7ffd9b7c34af 3680->3691 3681->3660 3693 7ffd9b7c34ba 3681->3693 3682->3687 3692 7ffd9b7c34fa-7ffd9b7c3505 3682->3692 3694 7ffd9b7c3588-7ffd9b7c358d 3683->3694 3696 7ffd9b7c350e 3683->3696 3684->3694 3686->3665 3700 7ffd9b7c349b-7ffd9b7c349d 3686->3700 3721 7ffd9b7c365a-7ffd9b7c3666 3687->3721 3688->3683 3701 7ffd9b7c34ef 3688->3701 3697 7ffd9b7c3517 3689->3697 3690->3682 3695 7ffd9b7c34c3-7ffd9b7c34c8 3690->3695 3691->3679 3691->3690 3692->3697 3702 7ffd9b7c3507 3692->3702 3693->3690 3694->3674 3703 7ffd9b7c3593-7ffd9b7c3595 3694->3703 3695->3660 3695->3664 3704 7ffd9b7c350f-7ffd9b7c3515 3696->3704 3705 7ffd9b7c353e-7ffd9b7c3540 3696->3705 3706 7ffd9b7c352a-7ffd9b7c352c 3697->3706 3707 7ffd9b7c3519-7ffd9b7c3523 3697->3707 3698->3699 3708 7ffd9b7c3569-7ffd9b7c356e 3698->3708 3711 7ffd9b7c3577 3699->3711 3712 7ffd9b7c35f1-7ffd9b7c35fc call 7ffd9b7c0198 3699->3712 3700->3691 3710 7ffd9b7c349f 3700->3710 3701->3682 3701->3683 3702->3677 3714 7ffd9b7c35a7 3703->3714 3715 7ffd9b7c3597 3703->3715 3704->3689 3704->3706 3713 7ffd9b7c3542-7ffd9b7c3544 3705->3713 3706->3672 3722 7ffd9b7c352e-7ffd9b7c3533 3706->3722 3717 7ffd9b7c3535 3707->3717 3718 7ffd9b7c3525 3707->3718 3719 7ffd9b7c3580 3708->3719 3720 7ffd9b7c3570 3708->3720 3723 7ffd9b7c34a2 3710->3723 3711->3714 3724 7ffd9b7c3578-7ffd9b7c357e 3711->3724 3738 7ffd9b7c35fe-7ffd9b7c35ff 3712->3738 3727 7ffd9b7c3546-7ffd9b7c354b 3713->3727 3728 7ffd9b7c3574 3713->3728 3730 7ffd9b7c35a9-7ffd9b7c35ad 3714->3730 3731 7ffd9b7c35b4-7ffd9b7c35b6 3714->3731 3725 7ffd9b7c359c-7ffd9b7c359e 3715->3725 3717->3713 3733 7ffd9b7c3537-7ffd9b7c353b 3717->3733 3718->3706 3719->3725 3726 7ffd9b7c3581 3719->3726 3720->3728 3732 7ffd9b7c366a-7ffd9b7c366b 3721->3732 3722->3713 3722->3717 3723->3666 3724->3719 3724->3725 3736 7ffd9b7c35a0-7ffd9b7c35a5 3725->3736 3737 7ffd9b7c35ce 3725->3737 3726->3684 3734 7ffd9b7c354f-7ffd9b7c3551 3727->3734 3735 7ffd9b7c354d 3727->3735 3728->3699 3739 7ffd9b7c35bf 3730->3739 3740 7ffd9b7c35af 3730->3740 3741 7ffd9b7c35b8-7ffd9b7c35bd 3731->3741 3742 7ffd9b7c35e6-7ffd9b7c35f0 3731->3742 3743 7ffd9b7c366c-7ffd9b7c368f 3732->3743 3733->3735 3744 7ffd9b7c353d 3733->3744 3734->3671 3734->3726 3735->3730 3735->3734 3736->3714 3736->3731 3737->3738 3745 7ffd9b7c35d0-7ffd9b7c35d5 3737->3745 3751 7ffd9b7c3606-7ffd9b7c360b 3738->3751 3746 7ffd9b7c35cc 3739->3746 3747 7ffd9b7c35c1-7ffd9b7c35c5 3739->3747 3740->3731 3741->3739 3741->3746 3742->3712 3748 7ffd9b7c3690-7ffd9b7c36af 3743->3748 3744->3705 3749 7ffd9b7c35d7 3745->3749 3750 7ffd9b7c3612-7ffd9b7c3614 3745->3750 3746->3737 3747->3749 3752 7ffd9b7c35c7 3747->3752 3753 7ffd9b7c36b0-7ffd9b7c36d5 3748->3753 3749->3750 3754 7ffd9b7c35d9-7ffd9b7c35e4 3749->3754 3757 7ffd9b7c3616-7ffd9b7c361b 3750->3757 3758 7ffd9b7c3644 3750->3758 3755 7ffd9b7c361d 3751->3755 3756 7ffd9b7c360d 3751->3756 3752->3746 3753->3748 3759 7ffd9b7c36d7-7ffd9b7c36e6 3753->3759 3754->3687 3754->3742 3762 7ffd9b7c3628-7ffd9b7c362a 3755->3762 3763 7ffd9b7c361f-7ffd9b7c3621 3755->3763 3756->3750 3757->3755 3757->3762 3758->3732 3761 7ffd9b7c3646-7ffd9b7c3653 3758->3761 3760 7ffd9b7c36e8-7ffd9b7c36f5 3759->3760 3760->3753 3766 7ffd9b7c36f7-7ffd9b7c3716 3760->3766 3762->3721 3767 7ffd9b7c362c-7ffd9b7c3631 3762->3767 3764 7ffd9b7c3633-7ffd9b7c3637 3763->3764 3765 7ffd9b7c3623 3763->3765 3769 7ffd9b7c3470-7ffd9b7c3472 3764->3769 3770 7ffd9b7c363d-7ffd9b7c3642 3764->3770 3765->3762 3768 7ffd9b7c371a-7ffd9b7c372d 3766->3768 3767->3764 3767->3769 3768->3760 3771 7ffd9b7c372f-7ffd9b7c3771 3768->3771 3769->3723 3772 7ffd9b7c3474 3769->3772 3770->3743 3770->3758 3771->3768 3772->3662
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0d07cefd4dbd7867c4fefba1f96bc3e0a839588d11cc914187ee06f6909bef56
                            • Instruction ID: f1e2c91fac9cbdcef4540a94f46508ed6580d2380b780447d7c1b250d683be2e
                            • Opcode Fuzzy Hash: 0d07cefd4dbd7867c4fefba1f96bc3e0a839588d11cc914187ee06f6909bef56
                            • Instruction Fuzzy Hash: 57D14211A1E3C61EE77762A498361753F609F52305F1702FFC589CA2F3D92D6A0A8372
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID: P_^:$P_^<
                            • API String ID: 0-1571676453
                            • Opcode ID: 0588171d1c53ab37bcebddd639396b07b04d8641f643cec7eafed143e08e7c6c
                            • Instruction ID: 4865bb107ec8690e68cb4eaec4585fb8e6931a513ba7dcf5bac2f19fb1113c43
                            • Opcode Fuzzy Hash: 0588171d1c53ab37bcebddd639396b07b04d8641f643cec7eafed143e08e7c6c
                            • Instruction Fuzzy Hash: DFF10717F0E6D22AF325B6F938294FD3B64DFC173972A82BBD09D890E79C08254582D5
                            Memory Dump Source
                            • Source File: 00000000.00000002.4141691213.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b7c0000_loader.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2dcf9a015f2526479dcd592b3c410957c6f2ea3399b444e618ea4d6a7da3f8a2
                            • Instruction ID: 4759c06ebb3b0005085022250eb41dbe7b57ee35110a493f05661054fe187f2e
                            • Opcode Fuzzy Hash: 2dcf9a015f2526479dcd592b3c410957c6f2ea3399b444e618ea4d6a7da3f8a2
                            • Instruction Fuzzy Hash: 0B41E522E0F79B2AF7FBB1B484791B576909F53300F0607BDC44C972F2EA0C6A5A5291