Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
loader.exe

Overview

General Information

Sample name:loader.exe
Analysis ID:1585383
MD5:0fd9836e2142bc85ced43d8316650b6c
SHA1:17ad9773af8f56332d728f94890d9f5a37ec5d03
SHA256:b870c9ee4b011fdb66b100275c583a3dc2e5884af31a4819f4b484ef839253fb
Tags:exeuser-aachum
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
AI detected suspicious sample
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loader.exe (PID: 5036 cmdline: "C:\Users\user\Desktop\loader.exe" MD5: 0FD9836E2142BC85CED43D8316650B6C)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: loader.exeReversingLabs: Detection: 65%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: loader.exeJoe Sandbox ML: detected
Source: loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficTCP traffic: 192.168.2.5:49707 -> 147.185.221.24:48428
Source: Joe Sandbox ViewIP Address: 147.185.221.24 147.185.221.24
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: co-updated.gl.at.ply.gg
Source: loader.exe, 00000000.00000002.3916317395.0000000002571000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: loader.exe, 00000000.00000002.3916317395.00000000027D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_975ac80e-6
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F1E9AD NtProtectVirtualMemory,0_2_00007FF848F1E9AD
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F172360_2_00007FF848F17236
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F1C6810_2_00007FF848F1C681
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F196A10_2_00007FF848F196A1
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F1BAE80_2_00007FF848F1BAE8
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F134400_2_00007FF848F13440
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F114480_2_00007FF848F11448
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F210D80_2_00007FF848F210D8
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F17FE20_2_00007FF848F17FE2
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F1BD4B0_2_00007FF848F1BD4B
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F210A50_2_00007FF848F210A5
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F19CB10_2_00007FF848F19CB1
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F102FD0_2_00007FF848F102FD
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F1EB0B0_2_00007FF848F1EB0B
Source: loader.exe, 00000000.00000000.2048496512.0000000000162000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe. vs loader.exe
Source: loader.exeBinary or memory string: OriginalFilenameClient.exe. vs loader.exe
Source: loader.exe, FDdCFtRGHOCQM.csSecurity API names: File.GetAccessControl
Source: loader.exe, FDdCFtRGHOCQM.csSecurity API names: File.SetAccessControl
Source: loader.exe, FDdCFtRGHOCQM.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
Source: loader.exe, qlllUayZ.csSecurity API names: Directory.GetAccessControl
Source: loader.exe, qlllUayZ.csSecurity API names: Directory.SetAccessControl
Source: loader.exe, rUGHQDGuDhlrp.csSecurity API names: Directory.GetAccessControl
Source: loader.exe, rUGHQDGuDhlrp.csSecurity API names: Directory.SetAccessControl
Source: loader.exe, rUGHQDGuDhlrp.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
Source: loader.exe, dzYeBNghHSwLaeT.csSecurity API names: File.GetAccessControl
Source: loader.exe, dzYeBNghHSwLaeT.csSecurity API names: File.SetAccessControl
Source: loader.exe, wUnKJwFwMLX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: classification engineClassification label: mal68.evad.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\loader.exeMutant created: NULL
Source: C:\Users\user\Desktop\loader.exeMutant created: \Sessions\1\BaseNamedObjects\Windows company
Source: loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: loader.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\loader.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: loader.exeReversingLabs: Detection: 65%
Source: C:\Users\user\Desktop\loader.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: devenum.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: netfxperf.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: esentprf.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: perfts.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: utildll.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: tdh.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: msdtcuiu.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: atl.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: msdtcprx.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: mtxclu.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: clusapi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: resutils.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: ktmw32.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: msscntrs.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: perfdisk.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: wmiclnt.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: perfnet.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: browcli.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: perfos.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: perfproc.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: sysmain.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: rasctrs.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: tapiperf.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: perfctrs.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: usbperf.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: tquery.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Users\user\Desktop\loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
Source: loader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: loader.exe, RHxDmhGvQNRS.cs.Net Code: NXUCOPGm
Source: loader.exeStatic PE information: 0xF5FE416F [Wed Oct 13 03:20:15 2100 UTC]
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F1BAE8 push ecx; ret 0_2_00007FF848F1C25E
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F100BD pushad ; iretd 0_2_00007FF848F100C1
Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00007FF848F1A8DA push eax; iretd 0_2_00007FF848F1A91D
Source: loader.exe, bJLBJJiOps.csHigh entropy of concatenated method names: '_003CStart_003Eb__1_0', '_003CUninstall_003Eb__2_0', '_003CLoopInstall_003Eb__7_0', '_003CStartAsBypass_003Eb__10_0', 'bivKevTybFCvNV', 'gJXZTMvkOVpH', 'lwrzJpOQYfAJRd', 'MYOxgfdYrQZcfy', 'ooneMeODmYGNI', 'WPCiHYqHsbJI'
Source: loader.exe, RHxDmhGvQNRS.csHigh entropy of concatenated method names: 'iMuWkPBrMs', 'LouCbBjQcSXtT', 'GmKMcbBYXf', 'npYmjlEOOsyn', 'TOdAqyKS', 'EddqfkQhmROZ', 'MKdsgTeFZIzGsN', 'AhZUKMkvJsGUxgF', 'YefCSWyRroVfU', 'kmWSgEruObcP'
Source: loader.exe, vRaSIojti.csHigh entropy of concatenated method names: 'MMyPiBeqb', 'YvlySdePnRnR', 'WYXkjTzkhwSerUS', 'TcAzdmzfc', 'eJUGQWvS', 'qLQuXbvrzSTa', 'MFTpmRQkZ', 'HjopQbfwjZsbyC', 'dXiuANIZVxPmb', 'dBrRUJLjmeQTV'
Source: loader.exe, qlllUayZ.csHigh entropy of concatenated method names: 'nDqpbiTIXcjysbS', 'xLZCmzqGJekfR', 'xWpkbbUiT', 'SeRHNExKSyXOZW', 'nMkgxyoqO', 'MJHArROskjHh', 'sEgaMSlixSanO', 'CWqenDcBvpKah', 'WpmDFdrbQ', 'bYcwOqhMcgM'
Source: loader.exe, jqEtvsjElPJ.csHigh entropy of concatenated method names: 'MBsrdtNdDnnnssD', 'yjJHPGFvwaFtUbd', 'BUnXwZdGUkSv', 'RBConFCG', 'jGvwvCnT', 'cKMmXEfAZ', 'CmfoJteY', 'FgVbUzlh', 'zebSBbqlqedx', 'mgwDQESlD'
Source: loader.exe, stTBaitjo.csHigh entropy of concatenated method names: 'ruArbZIzucGR', 'rrFsytWtuoXzRVh', 'phuVaErvy', 'LVbRSCawcKVpvpS', 'wFcsKDaqEuMvW', 'AJuDiASdVVYUtW', 'AmEDoHlTFkHukN', 'qeapKLvsGRT', 'kHTpJECEHHs', 'fPpoSaFhPxeuu'
Source: loader.exe, iWpfJXRBcsiSe.csHigh entropy of concatenated method names: 'iDxSBFvrvsGMhGy', 'TZSUYCtgTBWivcC', 'cNIOprwB', 'rawYwqLDiYJzJX', 'JQyAjNvTqEkT', 'kEbcRggbxIWKKeM', 'sCSpcFYt', 'RawHFUMWOSdwghd', 'ELIbpZiiPxBReU', 'gihAFkUrnKow'
Source: loader.exe, OSwSXnJrgr.csHigh entropy of concatenated method names: 'MVwseiwerfsLHEK', 'diLKteoarZc', 'MKPnMAGddAJmVu', 'kWGoNNSfJVgCi', 'WAEGERgPEzGy', 'rdZYozsDDlkPe', 'fGSfyXxHAEgRcEV', 'GiOgaCjwrC', 'cSPTrZXBJmUHbj', 'dVsXWoimeCAyT'
Source: loader.exe, rUGHQDGuDhlrp.csHigh entropy of concatenated method names: 'DGbfasnCP', 'wTzQCjOM', 'nBNiJlAchsgSBWb', 'oaUVYuoEFKwDp', 'TSYtBJpYSuZPFK', 'huxXiOJtratNJ', 'yowmpYOuIVRs', 'IavIodUYPz', 'GeKYgSIwgvTF', 'dQmVnmcGqyBT'
Source: loader.exe, leMxQLftuJ.csHigh entropy of concatenated method names: 'HlxmVSABVQitbYc', 'lprSGMWJnLkxf', 'rWSUITiA', 'pVMbzCllZ', 'ctDCqruOnzKiDV', 'YMaHPJAkeC', 'tkWHCaKKCLnTcdN', 'uBAHSqLb', 'KdKebJZAtxKsgw', 'XsTEltyeBEGjd'
Source: loader.exe, FDdCFtRGHOCQM.csHigh entropy of concatenated method names: 'xvgOgzkICCM', 'alQnzCmA', 'IjLxzlUbA', 'gwfECITpA', 'xAbqDSgp', 'OAeLNoMURhO', 'gCufFvhNff', 'lzKIIVtgFe', 'mHCkRPqnC', 'mlRygKyXy'
Source: loader.exe, dzYeBNghHSwLaeT.csHigh entropy of concatenated method names: 'eyApHeFUmp', 'LMJeNuOcJaMS', 'DXizEMHkncCoIv', 'zuDrMmVUxnjQLB', 'nRgNljwGQ', 'hqXkHpFzYdO', 'UFBiDkMVvvi', 'okIuKHComSev', 'kqxeRnYvQwaLDgL', 'vdlHuvWhKpRaakC'
Source: loader.exe, MAaNXHPtUGPA.csHigh entropy of concatenated method names: 'nowExJDNPXzUVOc', 'hnlgCLUP', 'XkwKAhfrk', 'xgBjowRxdat', 'tmnnTeTv', 'UgvaZHDOqTcl', 'fZgDxjlOroPVqJ', 'NNBYovdzFJO', 'OimGQRCHNHQgjK', 'crfEjyfAcS'
Source: loader.exe, WuwjxQjqxxhUmd.csHigh entropy of concatenated method names: '_003CScreenShot_003Eb__16_0', 'SrujlyRTX', 'xAYrtwqqMzfFBlj', 'nptNDudrkHXbxsF', 'YnzPLzDAqead', 'MpIAmLcaKsDX', 'HlZPtUuFhOmTo', 'ltWZTAOXSOaLhc', 'NuvserSa', 'lGiXfbWhyXqg'
Source: loader.exe, JOBvRAQMqQTcJE.csHigh entropy of concatenated method names: 'zZdmUzNmubXYo', 'oitNwaBDwihoKSu', 'NhOLExpVB', 'wbHTtbbSCiaONd', 'wdvFgousnNpKd', 'qsYMHeavcoFMsQ', 'hzUkaHUuQ', 'ABiTGDRybLp', 'CGzKBAGz', 'wdgGOVZCjWy'
Source: loader.exe, NFoBFrADgPEd.csHigh entropy of concatenated method names: 'ipbFuUOMvyKyLDD', 'TFwlCnlNEsxpD', 'kFIWOmEBKMORRHe', 'tnxRNKIs', 'vDNBCXZIwNFpppR', 'SukWlWejByJsm', 'axQbSiqzIopIU', 'YMExfiuPYVJZZez', 'NhWKnHZN', 'jrSlvhcBkKo'
Source: loader.exe, xFNjOTRQu.csHigh entropy of concatenated method names: 'GWhsVCIFTV', 'DHvhHiry', 'cHCpapiwzNERa', 'VUoCOBeSWGHtyR', 'HkZSJkzU', 'SfUMFGRndQaMSg', 'wGKlvhgrQusc', 'zQFWAvkigRMP', 'UPhrpoEwVCaOZL', 'oESNenoMKDMXw'
Source: loader.exe, sQBzIOKx.csHigh entropy of concatenated method names: 'SqaFaHxmOfGyT', 'GccuePvdV', 'QyZoyyBcIzy', 'tPpPpwPHvCZFuW', 'TfimpUGpbhIo', 'ddpUMPiMFO', 'zNOYNZTtbSh', 'aNJVnaOigHzdRME', 'eoTOQInbGibBOPM', 'vgPGCtvmrgtrOlG'
Source: loader.exe, gnWfyphMe.csHigh entropy of concatenated method names: 'xezAuLbmi', 'BooPEUKzBQ', 'ugAUtRWU', 'FueFmCvKGPAnHqG', 'zHbdfiLNCDxygA', 'ERnJGKicBZzsmQR', 'puctJvrOWjQCj', 'xeFUvVUh', 'hRfZDfpYwkQHDDH', 'JaYnWtfswcVnR'
Source: loader.exe, hpWbfDQQRNsZfQ.csHigh entropy of concatenated method names: 'NcYduEtdsEvPIS', 'tGlOgieSM', 'VTIVMproyoIFKv', 'nLdXjnHxFTmoQ', 'IiJMmZklIgOEa', 'eDnvpesWB', 'cDNWDBZBbEpGztX', 'ACDxJfMyTCf', 'zlrmgOjjLNiGGN', 'WTXEuYSeqTDl'
Source: C:\Users\user\Desktop\loader.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MSDTC Bridge 3.0.0.0\LinkageJump to behavior
Source: C:\Users\user\Desktop\loader.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\.NET Memory Cache 4.0\LinkageJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\Desktop\loader.exeMemory allocated: 820000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\loader.exeMemory allocated: 1A570000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\loader.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\loader.exeWindow / User API: threadDelayed 1896Jump to behavior
Source: C:\Users\user\Desktop\loader.exeWindow / User API: threadDelayed 7890Jump to behavior
Source: C:\Users\user\Desktop\loader.exe TID: 2172Thread sleep time: -35971150943733603s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT UserName FROM Win32_ComputerSystem
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\loader.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: loader.exe, 00000000.00000002.3916317395.0000000002571000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000000.00000002.3916317395.000000000292D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $Hyper-V Hypervisor Logical Processor
Source: loader.exe, 00000000.00000002.3920652540.000000001B185000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Servicelb
Source: loader.exe, 00000000.00000002.3921080245.000000001C269000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AlDHyper-V Virtual Machine Bus Pipes
Source: loader.exe, 00000000.00000002.3921488383.000000001CC80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer I
Source: loader.exe, 00000000.00000002.3920652540.000000001B1CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: loader.exe, 00000000.00000002.3916317395.0000000002571000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000000.00000002.3916317395.000000000292D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: !Hyper-V Virtual Machine Bus Pipes
Source: loader.exe, 00000000.00000002.3921080245.000000001C269000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partition
Source: loader.exe, 00000000.00000002.3920652540.000000001B1CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service8
Source: loader.exe, 00000000.00000002.3916317395.0000000002571000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000000.00000002.3916317395.000000000292D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: *Hyper-V Dynamic Memory Integration Service
Source: loader.exe, 00000000.00000002.3921028984.000000001C1F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisor
Source: loader.exe, 00000000.00000002.3920652540.000000001B185000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: loader.exe, 00000000.00000002.3921080245.000000001C269000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor:o
Source: loader.exe, 00000000.00000002.3920543632.000000001B160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V hkwxlfuauvtyfti Bus
Source: loader.exe, 00000000.00000002.3921488383.000000001CC2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot(
Source: loader.exe, 00000000.00000002.3916317395.0000000002571000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000000.00000002.3916317395.000000000292D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor
Source: loader.exe, 00000000.00000002.3916317395.0000000002571000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000000.00000002.3916317395.000000000292D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: !Hyper-V Hypervisor Root Partition
Source: loader.exe, 00000000.00000002.3916040580.000000000070A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: prlVideoMode
Source: loader.exe, 00000000.00000002.3916317395.0000000002571000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000000.00000002.3916317395.000000000292D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )Hyper-V Hypervisor Root Virtual Processor
Source: loader.exe, 00000000.00000002.3916317395.0000000002571000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000000.00000002.3916317395.000000000292D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partition
Source: loader.exe, 00000000.00000002.3921488383.000000001CC80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partition.dll
Source: loader.exe, 00000000.00000002.3916040580.000000000070A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V hkwxlfuauvtyfti Bus PipesE4
Source: C:\Users\user\Desktop\loader.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\loader.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\loader.exeMemory allocated: page read and write | page guardJump to behavior
Source: loader.exe, 00000000.00000002.3921488383.000000001CC6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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<@><@>69920C631FC2FB8D6D45305<@>user<@>878411<@>298lmcEY<@>false<@>Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz,Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz @ 4<@>AN2HV<@>8GB<@>1GB<@>28 %<@>40 %<@>Microsoft Windows 10 Pro 64-bit<@>2.6<@>04.10.2023<@>Admin<@>Windows Defender<@>Program Manager
Source: loader.exe, 00000000.00000002.3916317395.00000000027D3000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000000.00000002.3921080245.000000001C22B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: loader.exe, 00000000.00000002.3916317395.00000000027D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
Source: loader.exe, 00000000.00000002.3916317395.00000000027D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Connecting<@>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<@><@>69920C631FC2FB8D6D45305<@>user<@>878411<@>298lmcEY<@>false<@>Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz,Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz @ 4<@>AN2HV<@>8GB<@>1GB<@>28 %<@>40 %<@>Microsoft Windows 10 Pro 64-bit<@>2.6<@>04.10.2023<@>Admin<@>Windows Defender<@>Program Manager
Source: loader.exe, 00000000.00000002.3916317395.00000000027D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Connecting<@>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<@><@>69920C631FC2FB8D6D45305<@>user<@>878411<@>298lmcEY<@>false<@>Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz,Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz @ 4<@>AN2HV<@>8GB<@>1GB<@>28 %<@>40 %<@>Microsoft Windows 10 Pro 64-bit<@>2.6<@>04.10.2023<@>Admin<@>Windows Defender<@>Program Manager@
Source: loader.exe, 00000000.00000002.3916317395.00000000027D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager2!
Source: loader.exe, 00000000.00000002.3916317395.00000000027D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 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<@><@>69920C631FC2FB8D6D45305<@>user<@>878411<@>298lmcEY<@>false<@>Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz,Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz @ 4<@>AN2HV<@>8GB<@>1GB<@>28 %<@>40 %<@>Microsoft Windows 10 Pro 64-bit<@>2.6<@>04.10.2023<@>Admin<@>Windows Defender<@>Program Manager
Source: loader.exe, 00000000.00000002.3921080245.000000001C22B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: loader.exe, 00000000.00000002.3921080245.000000001C22B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows'>
Source: C:\Users\user\Desktop\loader.exeQueries volume information: C:\Users\user\Desktop\loader.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\loader.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation BiasJump to behavior
Source: C:\Users\user\Desktop\loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
Windows Management Instrumentation
2
Windows Service
2
Windows Service
1
Disable or Modify Tools
11
Input Capture
1
System Time Discovery
Remote Services11
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Process Injection
251
Virtualization/Sandbox Evasion
LSASS Memory231
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS251
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Timestomp
Cached Domain Credentials123
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
loader.exe66%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
loader.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
co-updated.gl.at.ply.gg
147.185.221.24
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameloader.exe, 00000000.00000002.3916317395.0000000002571000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      147.185.221.24
      co-updated.gl.at.ply.ggUnited States
      12087SALSGIVERUSfalse
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1585383
      Start date and time:2025-01-07 15:49:43 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 6m 3s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:loader.exe
      Detection:MAL
      Classification:mal68.evad.winEXE@1/0@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 95%
      • Number of executed functions: 12
      • Number of non-executed functions: 2
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiApSrv.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 13.107.253.45, 4.245.163.56, 23.1.237.91
      • Excluded domains from analysis (whitelisted): www.bing.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Report size getting too big, too many NtEnumerateKey calls found.
      • Report size getting too big, too many NtOpenKey calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: loader.exe
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      147.185.221.24P3A946MOFP.exeGet hashmaliciousXWormBrowse
        BootstrapperV1.16.exeGet hashmaliciousXWormBrowse
          SharkHack.exeGet hashmaliciousXWormBrowse
            avaydna.exeGet hashmaliciousNjratBrowse
              ddos tool.exeGet hashmaliciousXWormBrowse
                L988Ph5sKX.exeGet hashmaliciousXWormBrowse
                  ANuh30XoVu.exeGet hashmaliciousXWormBrowse
                    p59UXHJRX3.exeGet hashmaliciousXenoRATBrowse
                      JdYlp3ChrS.exeGet hashmaliciousNjratBrowse
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        SALSGIVERUSMy33xbeYIX.exeGet hashmaliciousNjratBrowse
                        • 147.185.221.16
                        YPzNsfg4nR.exeGet hashmaliciousXWormBrowse
                        • 147.185.221.21
                        sela.exeGet hashmaliciousNjratBrowse
                        • 147.185.221.17
                        P3A946MOFP.exeGet hashmaliciousXWormBrowse
                        • 147.185.221.24
                        BootstrapperV1.16.exeGet hashmaliciousXWormBrowse
                        • 147.185.221.24
                        SharkHack.exeGet hashmaliciousXWormBrowse
                        • 147.185.221.24
                        avaydna.exeGet hashmaliciousNjratBrowse
                        • 147.185.221.24
                        ddos tool.exeGet hashmaliciousXWormBrowse
                        • 147.185.221.24
                        L988Ph5sKX.exeGet hashmaliciousXWormBrowse
                        • 147.185.221.24
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):5.311958825841602
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        • Win32 Executable (generic) a (10002005/4) 49.75%
                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                        • Windows Screen Saver (13104/52) 0.07%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        File name:loader.exe
                        File size:558'592 bytes
                        MD5:0fd9836e2142bc85ced43d8316650b6c
                        SHA1:17ad9773af8f56332d728f94890d9f5a37ec5d03
                        SHA256:b870c9ee4b011fdb66b100275c583a3dc2e5884af31a4819f4b484ef839253fb
                        SHA512:e1beadb41cf88827b33b607c05c30db24d8066238a64031c5b8a1ad8310ee582e988b175512deddedcf84885a73ccef736104fb65f757194bda1eabf43648905
                        SSDEEP:6144:o8RFsUOLYDm0ZnDVd7skTpd9qLS5VAsslKsbl0XC1Ipn3GcG:o8RFsSDmAnHVdsKKoDKIpn2c
                        TLSH:3DC4B20CFE81F804DE1A3DB7CFE911004B7165C1AE1296863169AFFD8B6637259E267C
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...oA............"...0..|............... ........@.. ....................................@................................
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x489ade
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0xF5FE416F [Wed Oct 13 03:20:15 2100 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x89a8c0x4f.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x8a0000x596.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8c0000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x87ae40x87c00bd74df3307839ee12353c8a0c15892bbFalse0.40618885244014735data5.317887837129265IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rsrc0x8a0000x5960x600757bb0ae9db13f8eddbcbc4febdd91d5False0.4127604166666667data4.028920590135457IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x8c0000xc0x200167380b7d8fffc44240583be92b1d0f6False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_VERSION0x8a0a00x30cdata0.4269230769230769
                        RT_MANIFEST0x8a3ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                        DLLImport
                        mscoree.dll_CorExeMain
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 7, 2025 15:50:52.687015057 CET4970748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:50:52.691859961 CET4842849707147.185.221.24192.168.2.5
                        Jan 7, 2025 15:50:52.691922903 CET4970748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:50:59.618957043 CET4970748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:50:59.623769999 CET4842849707147.185.221.24192.168.2.5
                        Jan 7, 2025 15:50:59.623837948 CET4970748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:50:59.628635883 CET4842849707147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:13.771951914 CET4970748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:13.776700020 CET4842849707147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:13.776782036 CET4970748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:13.781527042 CET4842849707147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:14.079828978 CET4842849707147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:14.079904079 CET4970748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:14.131310940 CET4970748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:14.136142969 CET4842849707147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:15.037652969 CET4984748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:15.042515039 CET4842849847147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:15.042589903 CET4984748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:15.191675901 CET4984748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:15.198689938 CET4842849847147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:15.198754072 CET4984748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:15.203588963 CET4842849847147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:27.927720070 CET4984748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:27.932663918 CET4842849847147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:27.932751894 CET4984748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:27.937575102 CET4842849847147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:36.422301054 CET4842849847147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:36.422403097 CET4984748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:36.422780037 CET4984748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:36.427901983 CET4997748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:36.429574966 CET4842849847147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:36.433535099 CET4842849977147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:36.433619976 CET4997748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:36.467936039 CET4997748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:36.472755909 CET4842849977147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:36.472851992 CET4997748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:36.477648973 CET4842849977147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:48.661876917 CET4997748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:48.666806936 CET4842849977147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:48.666908026 CET4997748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:48.671719074 CET4842849977147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:57.832747936 CET4842849977147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:57.832839966 CET4997748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:57.833295107 CET4997748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:57.838052034 CET4842849977147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:57.865338087 CET4998548428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:57.870147943 CET4842849985147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:57.870264053 CET4998548428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:57.906491041 CET4998548428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:57.911380053 CET4842849985147.185.221.24192.168.2.5
                        Jan 7, 2025 15:51:57.911454916 CET4998548428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:51:57.916244984 CET4842849985147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:11.661804914 CET4998548428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:11.666662931 CET4842849985147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:11.666793108 CET4998548428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:11.671586037 CET4842849985147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:19.250688076 CET4842849985147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:19.250824928 CET4998548428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:19.251331091 CET4998548428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:19.256186962 CET4842849985147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:19.662471056 CET4998648428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:19.667428017 CET4842849986147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:19.667560101 CET4998648428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:19.719147921 CET4998648428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:19.724087000 CET4842849986147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:19.724209070 CET4998648428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:19.729082108 CET4842849986147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:34.771151066 CET4998648428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:34.776010036 CET4842849986147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:34.776091099 CET4998648428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:34.780869961 CET4842849986147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:41.051862955 CET4842849986147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:41.051970959 CET4998648428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:41.052546978 CET4998648428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:41.057374954 CET4842849986147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:41.380825043 CET4998748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:41.385703087 CET4842849987147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:41.385843992 CET4998748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:41.425744057 CET4998748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:41.430520058 CET4842849987147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:41.430604935 CET4998748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:41.435394049 CET4842849987147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:57.020849943 CET4998748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:57.025635004 CET4842849987147.185.221.24192.168.2.5
                        Jan 7, 2025 15:52:57.025722027 CET4998748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:52:57.030461073 CET4842849987147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:02.767570019 CET4842849987147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:02.767740011 CET4998748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:02.768268108 CET4998748428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:02.773003101 CET4842849987147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:03.318068027 CET4998848428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:03.323076963 CET4842849988147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:03.323199034 CET4998848428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:03.360165119 CET4998848428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:03.365034103 CET4842849988147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:03.365104914 CET4998848428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:03.369858027 CET4842849988147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:16.559366941 CET4998848428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:16.564316988 CET4842849988147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:16.564428091 CET4998848428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:16.569307089 CET4842849988147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:24.709299088 CET4842849988147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:24.709436893 CET4998848428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:24.710103035 CET4998848428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:24.715647936 CET4842849988147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:24.943489075 CET4998948428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:24.948329926 CET4842849989147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:24.948441029 CET4998948428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:25.000798941 CET4998948428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:25.005575895 CET4842849989147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:25.005676031 CET4998948428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:25.010487080 CET4842849989147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:38.598819971 CET4998948428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:38.603640079 CET4842849989147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:38.603832960 CET4998948428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:38.608638048 CET4842849989147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:42.629842043 CET4998948428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:42.634630919 CET4842849989147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:42.635673046 CET4998948428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:42.640471935 CET4842849989147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:42.715466022 CET4998948428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:42.720366001 CET4842849989147.185.221.24192.168.2.5
                        Jan 7, 2025 15:53:42.722157001 CET4998948428192.168.2.5147.185.221.24
                        Jan 7, 2025 15:53:42.727061987 CET4842849989147.185.221.24192.168.2.5
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 7, 2025 15:50:52.643752098 CET6458753192.168.2.51.1.1.1
                        Jan 7, 2025 15:50:52.677295923 CET53645871.1.1.1192.168.2.5
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 7, 2025 15:50:52.643752098 CET192.168.2.51.1.1.10x234eStandard query (0)co-updated.gl.at.ply.ggA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 7, 2025 15:50:52.677295923 CET1.1.1.1192.168.2.50x234eNo error (0)co-updated.gl.at.ply.gg147.185.221.24A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:09:50:33
                        Start date:07/01/2025
                        Path:C:\Users\user\Desktop\loader.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\loader.exe"
                        Imagebase:0x160000
                        File size:558'592 bytes
                        MD5 hash:0FD9836E2142BC85CED43D8316650B6C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:14.4%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:100%
                          Total number of Nodes:3
                          Total number of Limit Nodes:0
                          execution_graph 15376 7ff848f1e9ad 15377 7ff848f1e9bf NtProtectVirtualMemory 15376->15377 15379 7ff848f1ea95 15377->15379
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID: -N_H$FN_H
                          • API String ID: 0-707270156
                          • Opcode ID: 5c6244f3ae6d1930113ce181d5313acaf1213bc786a5f8c41db9eb98ecd16c93
                          • Instruction ID: cd3e5c64acce8a866cc1835e2a51d11e350e97d6d93e07249d2a6c82181fdec1
                          • Opcode Fuzzy Hash: 5c6244f3ae6d1930113ce181d5313acaf1213bc786a5f8c41db9eb98ecd16c93
                          • Instruction Fuzzy Hash: 16A22631E1E5065FEB68F72888562B932D1EF54794F540279E80DC32C7EF1CAC0A879A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID: H
                          • API String ID: 0-2852464175
                          • Opcode ID: af8d2104a7c5b12d9eb1b4233e1e9273892d65dd67f76a455b7d5cd45c81108f
                          • Instruction ID: bc15290f273824eed600cdecb6545e65b307d14a03197c065666940a789e763a
                          • Opcode Fuzzy Hash: af8d2104a7c5b12d9eb1b4233e1e9273892d65dd67f76a455b7d5cd45c81108f
                          • Instruction Fuzzy Hash: A382E631E0D6C60FFB67B72488551B87BA0EF52390F9801BAC489C75D7DB1D6C4A839A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID: -N_H
                          • API String ID: 0-1279033356
                          • Opcode ID: dabed221bc3ebeb5fbae8c82beed9f65255c8878f6b1919fe085b3fb55af7df6
                          • Instruction ID: 9fa85922ac4a29fac9492c5087cbeb5eb2830ee0ea704d3f2511b2c56dae18b3
                          • Opcode Fuzzy Hash: dabed221bc3ebeb5fbae8c82beed9f65255c8878f6b1919fe085b3fb55af7df6
                          • Instruction Fuzzy Hash: 3982B331E2E5065FFB58F72888562793291EF64794F540279E80DC32C7FF1CAC1A869A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1348 7ff848f1bae8-7ff848f1baf1 1349 7ff848f1baf3 1348->1349 1350 7ff848f1bab7-7ff848f1babd 1348->1350 1353 7ff848f1bb6d-7ff848f1bb85 1349->1353 1354 7ff848f1baf5-7ff848f1bb02 1349->1354 1351 7ff848f1babf 1350->1351 1352 7ff848f1ba83-7ff848f1ba9b call 7ff848f1bae8 1350->1352 1355 7ff848f1bb39-7ff848f1bb4c 1351->1355 1356 7ff848f1bac1-7ff848f1bace 1351->1356 1374 7ff848f1baa0-7ff848f1baa9 1352->1374 1375 7ff848f1ba9b call 7ff848f1bae8 1352->1375 1357 7ff848f1bb88-7ff848f1bb99 1353->1357 1358 7ff848f1bb87 1353->1358 1359 7ff848f1bb03 1354->1359 1361 7ff848f1bb4e-7ff848f1bb4f 1355->1361 1362 7ff848f1bacf-7ff848f1badb 1356->1362 1363 7ff848f1bb9b 1357->1363 1364 7ff848f1bb9c-7ff848f1bbad 1357->1364 1358->1357 1366 7ff848f1bb05-7ff848f1bb0b 1359->1366 1367 7ff848f1bb50-7ff848f1bb6c 1361->1367 1362->1366 1368 7ff848f1badd 1362->1368 1363->1364 1370 7ff848f1bbaf 1364->1370 1371 7ff848f1bbb0-7ff848f1bbcc 1364->1371 1372 7ff848f1bb0d-7ff848f1bb1e 1366->1372 1373 7ff848f1bb23-7ff848f1bb26 1366->1373 1367->1353 1368->1359 1377 7ff848f1badf-7ff848f1bae7 1368->1377 1370->1371 1382 7ff848f1bbce-7ff848f1bbe1 1371->1382 1383 7ff848f1bc16-7ff848f1bc25 call 7ff848f13440 1371->1383 1372->1373 1373->1367 1376 7ff848f1bb28 1373->1376 1374->1362 1384 7ff848f1baab-7ff848f1bab3 1374->1384 1375->1374 1376->1361 1380 7ff848f1bb2a-7ff848f1bb32 1376->1380 1386 7ff848f1bbe6-7ff848f1bbed 1382->1386 1392 7ff848f1bc37-7ff848f1bc3b 1383->1392 1393 7ff848f1bc27-7ff848f1bc33 1383->1393 1384->1350 1388 7ff848f1bc0b-7ff848f1bc14 1386->1388 1389 7ff848f1bbef-7ff848f1bbf6 1386->1389 1388->1383 1390 7ff848f1bbf8 1389->1390 1391 7ff848f1bbfd-7ff848f1bc04 1389->1391 1390->1391 1391->1386 1394 7ff848f1bc06 1391->1394 1395 7ff848f1bc3c 1392->1395 1396 7ff848f1bcb0-7ff848f1bcb4 1392->1396 1401 7ff848f1bc45-7ff848f1bc54 call 7ff848f1a750 1393->1401 1402 7ff848f1bc35 1393->1402 1397 7ff848f1bcc3-7ff848f1bcd0 1394->1397 1399 7ff848f1bc9a-7ff848f1bca0 call 7ff848f1a800 1395->1399 1400 7ff848f1bc3d-7ff848f1bc42 1395->1400 1396->1397 1405 7ff848f1bca5-7ff848f1bcaf call 7ff848f1bcd1 1399->1405 1400->1401 1407 7ff848f1bc59-7ff848f1bc67 call 7ff848f1b310 1401->1407 1402->1392 1405->1396 1410 7ff848f1bc69-7ff848f1bc72 call 7ff848f1a7f0 1407->1410 1411 7ff848f1bc77-7ff848f1bc98 1407->1411 1410->1411 1411->1399
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: 383d119c156536dad0d27461fcf3e0f05b86a47baeeaaff81878170835b82368
                          • Instruction ID: 0646691af0a713a87f6210cb6d25e44c7478c6e74342c05f872edee8e8a1e284
                          • Opcode Fuzzy Hash: 383d119c156536dad0d27461fcf3e0f05b86a47baeeaaff81878170835b82368
                          • Instruction Fuzzy Hash: F562D431D6E2864FE756B33888551B97BA0DF56794F0902FAD08CC71D3EE1C6C0A8796

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1416 7ff848f1c681-7ff848f1c683 1417 7ff848f1c6fd-7ff848f1c6ff 1416->1417 1418 7ff848f1c684 1416->1418 1419 7ff848f1c77c-7ff848f1c797 1417->1419 1420 7ff848f1c700 1417->1420 1421 7ff848f1c6ae-7ff848f1c6b2 1418->1421 1422 7ff848f1c685-7ff848f1c686 1418->1422 1434 7ff848f1c799 1419->1434 1435 7ff848f1c75d-7ff848f1c76e 1419->1435 1426 7ff848f1c701-7ff848f1c702 1420->1426 1427 7ff848f1c712-7ff848f1c716 1420->1427 1424 7ff848f1c6b4-7ff848f1c6b6 1421->1424 1425 7ff848f1c646-7ff848f1c651 1421->1425 1428 7ff848f1c688-7ff848f1c68d 1422->1428 1429 7ff848f1c6ac-7ff848f1c6ad 1422->1429 1436 7ff848f1c6c8 1424->1436 1437 7ff848f1c6b8 1424->1437 1430 7ff848f1c65f-7ff848f1c666 1425->1430 1431 7ff848f1c653-7ff848f1c65d 1425->1431 1438 7ff848f1c707-7ff848f1c709 1426->1438 1432 7ff848f1c639-7ff848f1c63b 1427->1432 1433 7ff848f1c71c-7ff848f1c721 1427->1433 1429->1421 1440 7ff848f1c668 1430->1440 1441 7ff848f1c690 1430->1441 1431->1430 1449 7ff848f1c6ca-7ff848f1c6e1 1431->1449 1447 7ff848f1c66b-7ff848f1c66f 1432->1447 1448 7ff848f1c63d-7ff848f1c642 1432->1448 1439 7ff848f1c723 1433->1439 1442 7ff848f1c79b-7ff848f1c7a8 1434->1442 1443 7ff848f1c813-7ff848f1c815 1434->1443 1436->1449 1450 7ff848f1c6f1-7ff848f1c6f3 1436->1450 1444 7ff848f1c6bd-7ff848f1c6bf 1437->1444 1445 7ff848f1c739-7ff848f1c745 1438->1445 1446 7ff848f1c70b 1438->1446 1460 7ff848f1c74d-7ff848f1c756 1439->1460 1461 7ff848f1c725 1439->1461 1452 7ff848f1c66a 1440->1452 1453 7ff848f1c68e 1440->1453 1458 7ff848f1c6c0-7ff848f1c6c6 1441->1458 1459 7ff848f1c692-7ff848f1c697 1441->1459 1463 7ff848f1c7ba 1442->1463 1464 7ff848f1c7aa-7ff848f1c7af 1442->1464 1456 7ff848f1c845-7ff848f1c84e call 7ff848f20909 1443->1456 1457 7ff848f1c817-7ff848f1c81c 1443->1457 1444->1458 1465 7ff848f1c6ef-7ff848f1c6f0 1444->1465 1462 7ff848f1c74b 1445->1462 1455 7ff848f1c70f-7ff848f1c710 1446->1455 1466 7ff848f1c670-7ff848f1c672 1448->1466 1467 7ff848f1c644 1448->1467 1449->1433 1481 7ff848f1c6e3-7ff848f1c6e7 1449->1481 1450->1439 1454 7ff848f1c6f5-7ff848f1c6fa 1450->1454 1452->1447 1453->1441 1454->1438 1471 7ff848f1c6fc 1454->1471 1455->1432 1474 7ff848f1c711 1455->1474 1498 7ff848f1c851 1456->1498 1475 7ff848f1c81e 1457->1475 1476 7ff848f1c7b1-7ff848f1c7b3 1457->1476 1458->1436 1458->1450 1459->1444 1477 7ff848f1c699 1459->1477 1461->1462 1478 7ff848f1c727-7ff848f1c72c 1461->1478 1462->1460 1468 7ff848f1c7fd-7ff848f1c7ff 1463->1468 1469 7ff848f1c7bc 1463->1469 1464->1468 1472 7ff848f1c6a2-7ff848f1c6a6 1466->1472 1473 7ff848f1c674-7ff848f1c679 1466->1473 1467->1425 1467->1466 1483 7ff848f1c82f-7ff848f1c833 1468->1483 1484 7ff848f1c801-7ff848f1c806 1468->1484 1469->1468 1480 7ff848f1c7be-7ff848f1c7c4 1469->1480 1471->1417 1471->1438 1472->1424 1487 7ff848f1c6a8 1472->1487 1473->1453 1482 7ff848f1c67b 1473->1482 1474->1427 1475->1476 1485 7ff848f1c820-7ff848f1c829 1475->1485 1489 7ff848f1c7e3 1476->1489 1490 7ff848f1c7b5 1476->1490 1477->1444 1486 7ff848f1c69b-7ff848f1c69c 1477->1486 1491 7ff848f1c7c5 1480->1491 1481->1474 1492 7ff848f1c6e9 1481->1492 1482->1453 1494 7ff848f1c67d 1482->1494 1484->1443 1495 7ff848f1c808 1484->1495 1496 7ff848f1c82b 1485->1496 1497 7ff848f1c853-7ff848f1c888 call 7ff848f20921 1485->1497 1486->1472 1487->1429 1489->1491 1493 7ff848f1c7e7-7ff848f1c7f6 1489->1493 1490->1463 1499 7ff848f1c7c7-7ff848f1c7e2 call 7ff848f1a860 1491->1499 1492->1455 1500 7ff848f1c6eb-7ff848f1c6ee 1492->1500 1493->1495 1508 7ff848f1c7f8 1493->1508 1494->1416 1495->1443 1501 7ff848f1c80a-7ff848f1c80c 1495->1501 1496->1498 1502 7ff848f1c82d 1496->1502 1510 7ff848f1c88a-7ff848f1c8a0 1497->1510 1511 7ff848f1c8d2-7ff848f1c8fe 1497->1511 1498->1497 1499->1489 1500->1465 1501->1475 1506 7ff848f1c80e 1501->1506 1502->1483 1506->1443 1508->1468 1513 7ff848f1c8b2-7ff848f1c8cf 1510->1513 1514 7ff848f1c8a2-7ff848f1c8a9 1510->1514 1521 7ff848f1c910-7ff848f1c920 1511->1521 1524 7ff848f1c900 1511->1524 1513->1511 1515 7ff848f1c8ab 1514->1515 1516 7ff848f1c907-7ff848f1c90c 1514->1516 1515->1513 1519 7ff848f1c90e 1516->1519 1520 7ff848f1c966-7ff848f1c96f 1516->1520 1519->1521 1526 7ff848f1c981-7ff848f1c99f 1520->1526 1527 7ff848f1c971 1520->1527 1529 7ff848f1c958-7ff848f1c961 1521->1529 1530 7ff848f1c922-7ff848f1c93c 1521->1530 1524->1516 1534 7ff848f1c9a2-7ff848f1c9b6 1526->1534 1531 7ff848f1c973-7ff848f1c977 1527->1531 1529->1531 1547 7ff848f1c963 1529->1547 1542 7ff848f1c9b8 1530->1542 1545 7ff848f1c93e-7ff848f1c957 1530->1545 1532 7ff848f1c978 1531->1532 1533 7ff848f1c9ec-7ff848f1ca35 1531->1533 1536 7ff848f1c979-7ff848f1c97e 1532->1536 1537 7ff848f1c9d6-7ff848f1c9dc 1532->1537 1544 7ff848f1ca36 1533->1544 1534->1542 1536->1526 1543 7ff848f1c9de 1537->1543 1537->1544 1542->1534 1548 7ff848f1c9b9-7ff848f1c9ce 1542->1548 1549 7ff848f1c9e0-7ff848f1c9eb 1543->1549 1545->1529 1547->1520 1548->1549 1556 7ff848f1c9d0 1548->1556 1549->1533 1556->1537
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID: E
                          • API String ID: 0-3568589458
                          • Opcode ID: c7202deff622fb8063fa00aa415f29c90b1db280feeba4d625221d8846338360
                          • Instruction ID: f319dbbbc88a53e7e96ce2b4524a4f93058852337beff3d778e398e56ae26caa
                          • Opcode Fuzzy Hash: c7202deff622fb8063fa00aa415f29c90b1db280feeba4d625221d8846338360
                          • Instruction Fuzzy Hash: ECE1F272D0D18A4EFB69B76898552B93BA0EF61390F5401BAC44CD71D3FF1C6C0A879A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1790 7ff848f1e9ad-7ff848f1ea93 NtProtectVirtualMemory 1795 7ff848f1ea9b-7ff848f1eac6 1790->1795 1796 7ff848f1ea95 1790->1796 1796->1795
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID: MemoryProtectVirtual
                          • String ID:
                          • API String ID: 2706961497-0
                          • Opcode ID: 84a7930f3abf35ea3607735e339c0b5425304b07092d1f7e8555b93cbd99da08
                          • Instruction ID: ca7c6eed9afab191f4606620a7dafd72c8b72cb2439b0d652e220e89393a7749
                          • Opcode Fuzzy Hash: 84a7930f3abf35ea3607735e339c0b5425304b07092d1f7e8555b93cbd99da08
                          • Instruction Fuzzy Hash: D431B57191CB4C8FDB58DB5C98066ED7BE1EB99320F00426FE449D3292CF75A8458BC6

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1798 7ff848f210a5-7ff848f21fbe 1809 7ff848f21fcb-7ff848f21fcd 1798->1809 1810 7ff848f21fc0 1798->1810 1812 7ff848f21ffd-7ff848f21ffe 1809->1812 1813 7ff848f21fcf-7ff848f21fd4 1809->1813 1810->1809 1811 7ff848f21fc2-7ff848f21fc4 1810->1811 1814 7ff848f21fd6-7ff848f21ffc 1811->1814 1815 7ff848f21fc6 1811->1815 1816 7ff848f21fff-7ff848f22012 1812->1816 1813->1814 1814->1816 1815->1809 1820 7ff848f22014-7ff848f2201e 1816->1820 1822 7ff848f2202b-7ff848f2202d 1820->1822 1823 7ff848f22020 1820->1823 1825 7ff848f2205d-7ff848f22078 1822->1825 1826 7ff848f2202f-7ff848f22034 1822->1826 1823->1822 1824 7ff848f22022-7ff848f22024 1823->1824 1827 7ff848f22036-7ff848f2205b 1824->1827 1829 7ff848f22026 1824->1829 1831 7ff848f2207a 1825->1831 1832 7ff848f2207f-7ff848f22093 1825->1832 1826->1827 1827->1825 1829->1822 1831->1832 1837 7ff848f220ae 1832->1837 1838 7ff848f22095-7ff848f220ad 1832->1838 1839 7ff848f220af-7ff848f220b1 1837->1839 1838->1839 1840 7ff848f220b2-7ff848f220b7 1839->1840 1841 7ff848f220b9 1840->1841 1842 7ff848f220be-7ff848f220c3 1840->1842 1841->1842 1842->1840 1843 7ff848f220c5-7ff848f22119 1842->1843 1849 7ff848f2212b 1843->1849 1850 7ff848f2211b 1843->1850 1852 7ff848f2212d-7ff848f22134 1849->1852 1853 7ff848f2215e-7ff848f22160 1849->1853 1851 7ff848f22120-7ff848f22122 1850->1851 1856 7ff848f22152-7ff848f22157 1851->1856 1857 7ff848f22124-7ff848f22129 1851->1857 1858 7ff848f22136-7ff848f2214c call 7ff848f211b8 1852->1858 1854 7ff848f22190-7ff848f221a5 1853->1854 1855 7ff848f22162-7ff848f22167 1853->1855 1866 7ff848f221a6-7ff848f221a9 1854->1866 1859 7ff848f22169 1855->1859 1861 7ff848f22174-7ff848f22176 1855->1861 1856->1859 1860 7ff848f22159 1856->1860 1857->1849 1857->1853 1863 7ff848f22151 1858->1863 1859->1861 1864 7ff848f2216b-7ff848f2216d 1859->1864 1860->1853 1865 7ff848f22178-7ff848f2217d 1861->1865 1861->1866 1863->1856 1869 7ff848f2217f 1864->1869 1870 7ff848f2216f 1864->1870 1865->1851 1865->1869 1868 7ff848f221ac-7ff848f221ce call 7ff848f221dd 1866->1868 1875 7ff848f221f8-7ff848f22200 1868->1875 1876 7ff848f221d0 1868->1876 1869->1851 1871 7ff848f22181-7ff848f2218f 1869->1871 1870->1861 1871->1854 1877 7ff848f22218-7ff848f2221b 1875->1877 1878 7ff848f22202-7ff848f2220d 1875->1878 1879 7ff848f221d2-7ff848f221e6 1876->1879 1880 7ff848f221f6-7ff848f221f7 1876->1880 1882 7ff848f2221d 1877->1882 1883 7ff848f22245-7ff848f2225d 1877->1883 1881 7ff848f2220f-7ff848f22213 1878->1881 1879->1868 1894 7ff848f221e8 1879->1894 1880->1875 1881->1877 1885 7ff848f2221f-7ff848f22227 1882->1885 1886 7ff848f22243 1882->1886 1884 7ff848f22262-7ff848f22265 1883->1884 1888 7ff848f22268-7ff848f22279 1884->1888 1889 7ff848f22267 1884->1889 1885->1884 1886->1883 1890 7ff848f2227b 1888->1890 1891 7ff848f2227c-7ff848f2229e 1888->1891 1889->1888 1890->1891 1896 7ff848f222a3-7ff848f222a8 1891->1896 1894->1884 1895 7ff848f221ea-7ff848f221f3 1894->1895 1895->1880 1897 7ff848f222aa 1896->1897 1898 7ff848f222af-7ff848f222b4 1896->1898 1897->1898 1898->1896 1899 7ff848f222b6-7ff848f222ba 1898->1899 1900 7ff848f222bc-7ff848f222c0 1899->1900 1901 7ff848f222c5-7ff848f222ca 1899->1901 1900->1901 1902 7ff848f222c2 1900->1902 1902->1901
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID: H
                          • API String ID: 0-2852464175
                          • Opcode ID: 2f2c984ccae7d6503ea14f6bd69e129b7c38204f51f95eef87fa69f1c7e8d641
                          • Instruction ID: 92e3cb2fbb28236136d086ce5c56227254d17b7c8a6440032dbfc56473019c82
                          • Opcode Fuzzy Hash: 2f2c984ccae7d6503ea14f6bd69e129b7c38204f51f95eef87fa69f1c7e8d641
                          • Instruction Fuzzy Hash: C3A1FA32D1D6864FE756F7A8A8155B4BBE0EF163A0F0905B7C048CB1E3DB2E6845C35A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2492 7ff848f210d8-7ff848f21e10 2494 7ff848f21e19 2492->2494 2495 7ff848f21e12-7ff848f21e17 2492->2495 2496 7ff848f21e1e-7ff848f21e23 2494->2496 2495->2494 2495->2496 2496->2495 2497 7ff848f21e25-7ff848f21e5e 2496->2497 2503 7ff848f21e6b-7ff848f21e74 2497->2503 2504 7ff848f21e60 2497->2504 2507 7ff848f21e76-7ff848f21eb1 2503->2507 2504->2503 2506 7ff848f21e62-7ff848f21e64 2504->2506 2506->2507 2508 7ff848f21e66 2506->2508 2513 7ff848f21eb2-7ff848f21eb7 2507->2513 2508->2503 2514 7ff848f21eb9 2513->2514 2515 7ff848f21ebe-7ff848f21ec3 2513->2515 2514->2515 2515->2513 2516 7ff848f21ec5-7ff848f21f13 2515->2516 2521 7ff848f21f2e 2516->2521 2522 7ff848f21f15-7ff848f21f2d 2516->2522 2523 7ff848f21f2f-7ff848f21f31 2521->2523 2522->2523 2524 7ff848f21f32-7ff848f21f37 2523->2524 2525 7ff848f21f39 2524->2525 2526 7ff848f21f3e-7ff848f21f43 2524->2526 2525->2526 2526->2524 2527 7ff848f21f45-7ff848f21f93 2526->2527 2535 7ff848f21fae 2527->2535 2536 7ff848f21f95-7ff848f21fad 2527->2536 2537 7ff848f21faf-7ff848f21fbe 2535->2537 2536->2537 2539 7ff848f21fcb-7ff848f21fcd 2537->2539 2540 7ff848f21fc0 2537->2540 2542 7ff848f21ffd-7ff848f21ffe 2539->2542 2543 7ff848f21fcf-7ff848f21fd4 2539->2543 2540->2539 2541 7ff848f21fc2-7ff848f21fc4 2540->2541 2544 7ff848f21fd6-7ff848f21ffc 2541->2544 2545 7ff848f21fc6 2541->2545 2546 7ff848f21fff-7ff848f22012 2542->2546 2543->2544 2544->2546 2545->2539 2550 7ff848f22014-7ff848f2201e 2546->2550 2552 7ff848f2202b-7ff848f2202d 2550->2552 2553 7ff848f22020 2550->2553 2555 7ff848f2205d-7ff848f22078 2552->2555 2556 7ff848f2202f-7ff848f22034 2552->2556 2553->2552 2554 7ff848f22022-7ff848f22024 2553->2554 2557 7ff848f22036-7ff848f2205b 2554->2557 2559 7ff848f22026 2554->2559 2561 7ff848f2207a 2555->2561 2562 7ff848f2207f-7ff848f22093 2555->2562 2556->2557 2557->2555 2559->2552 2561->2562 2567 7ff848f220ae 2562->2567 2568 7ff848f22095-7ff848f220ad 2562->2568 2569 7ff848f220af-7ff848f220b1 2567->2569 2568->2569 2570 7ff848f220b2-7ff848f220b7 2569->2570 2571 7ff848f220b9 2570->2571 2572 7ff848f220be-7ff848f220c3 2570->2572 2571->2572 2572->2570 2573 7ff848f220c5-7ff848f22119 2572->2573 2579 7ff848f2212b 2573->2579 2580 7ff848f2211b 2573->2580 2582 7ff848f2212d-7ff848f2214c call 7ff848f211b8 2579->2582 2583 7ff848f2215e-7ff848f22160 2579->2583 2581 7ff848f22120-7ff848f22122 2580->2581 2586 7ff848f22152-7ff848f22157 2581->2586 2587 7ff848f22124-7ff848f22129 2581->2587 2593 7ff848f22151 2582->2593 2584 7ff848f22190-7ff848f221a5 2583->2584 2585 7ff848f22162-7ff848f22167 2583->2585 2596 7ff848f221a6-7ff848f221a9 2584->2596 2589 7ff848f22169 2585->2589 2591 7ff848f22174-7ff848f22176 2585->2591 2586->2589 2590 7ff848f22159 2586->2590 2587->2579 2587->2583 2589->2591 2594 7ff848f2216b-7ff848f2216d 2589->2594 2590->2583 2595 7ff848f22178-7ff848f2217d 2591->2595 2591->2596 2593->2586 2599 7ff848f2217f 2594->2599 2600 7ff848f2216f 2594->2600 2595->2581 2595->2599 2598 7ff848f221ac-7ff848f221ce call 7ff848f221dd 2596->2598 2605 7ff848f221f8-7ff848f22200 2598->2605 2606 7ff848f221d0 2598->2606 2599->2581 2601 7ff848f22181-7ff848f2218f 2599->2601 2600->2591 2601->2584 2607 7ff848f22218-7ff848f2221b 2605->2607 2608 7ff848f22202-7ff848f22213 2605->2608 2609 7ff848f221d2-7ff848f221e6 2606->2609 2610 7ff848f221f6-7ff848f221f7 2606->2610 2612 7ff848f2221d 2607->2612 2613 7ff848f22245-7ff848f2225d 2607->2613 2608->2607 2609->2598 2624 7ff848f221e8 2609->2624 2610->2605 2615 7ff848f2221f-7ff848f22227 2612->2615 2616 7ff848f22243 2612->2616 2614 7ff848f22262-7ff848f22265 2613->2614 2618 7ff848f22268-7ff848f22279 2614->2618 2619 7ff848f22267 2614->2619 2615->2614 2616->2613 2620 7ff848f2227b 2618->2620 2621 7ff848f2227c-7ff848f2229e 2618->2621 2619->2618 2620->2621 2626 7ff848f222a3-7ff848f222a8 2621->2626 2624->2614 2625 7ff848f221ea-7ff848f221f3 2624->2625 2625->2610 2627 7ff848f222aa 2626->2627 2628 7ff848f222af-7ff848f222b4 2626->2628 2627->2628 2628->2626 2629 7ff848f222b6-7ff848f222ba 2628->2629 2630 7ff848f222bc-7ff848f222c0 2629->2630 2631 7ff848f222c5-7ff848f222ca 2629->2631 2630->2631 2632 7ff848f222c2 2630->2632 2632->2631
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2b4845bff1d1441b66311020695d8d494d2db5bd55efd3d51bea693e931a50c1
                          • Instruction ID: 18e499f9f4f9d05bf1ff8fb625530c8e0b42d5bffb271bab76de7a39b1705e6d
                          • Opcode Fuzzy Hash: 2b4845bff1d1441b66311020695d8d494d2db5bd55efd3d51bea693e931a50c1
                          • Instruction Fuzzy Hash: A8029231D0E6C64FF766E7A4A8156747FA0AF12390F1904F7D058CB1E3DB2E6849835A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2754 7ff848f17236-7ff848f17243 2755 7ff848f1724e-7ff848f17317 2754->2755 2756 7ff848f17245-7ff848f1724d 2754->2756 2760 7ff848f17319-7ff848f17322 2755->2760 2761 7ff848f17383 2755->2761 2756->2755 2760->2761 2763 7ff848f17324-7ff848f17330 2760->2763 2762 7ff848f17385-7ff848f173aa 2761->2762 2769 7ff848f173ac-7ff848f173b5 2762->2769 2770 7ff848f17416 2762->2770 2764 7ff848f17369-7ff848f17381 2763->2764 2765 7ff848f17332-7ff848f17344 2763->2765 2764->2762 2767 7ff848f17348-7ff848f1735b 2765->2767 2768 7ff848f17346 2765->2768 2767->2767 2771 7ff848f1735d-7ff848f17365 2767->2771 2768->2767 2769->2770 2772 7ff848f173b7-7ff848f173c3 2769->2772 2773 7ff848f17418-7ff848f174c0 2770->2773 2771->2764 2774 7ff848f173fc-7ff848f17414 2772->2774 2775 7ff848f173c5-7ff848f173d7 2772->2775 2784 7ff848f1752e 2773->2784 2785 7ff848f174c2-7ff848f174cc 2773->2785 2774->2773 2776 7ff848f173d9 2775->2776 2777 7ff848f173db-7ff848f173ee 2775->2777 2776->2777 2777->2777 2779 7ff848f173f0-7ff848f173f8 2777->2779 2779->2774 2787 7ff848f17530-7ff848f17559 2784->2787 2785->2784 2786 7ff848f174ce-7ff848f174db 2785->2786 2788 7ff848f174dd-7ff848f174ef 2786->2788 2789 7ff848f17514-7ff848f1752c 2786->2789 2794 7ff848f1755b-7ff848f17566 2787->2794 2795 7ff848f175c3 2787->2795 2790 7ff848f174f1 2788->2790 2791 7ff848f174f3-7ff848f17506 2788->2791 2789->2787 2790->2791 2791->2791 2793 7ff848f17508-7ff848f17510 2791->2793 2793->2789 2794->2795 2796 7ff848f17568-7ff848f17576 2794->2796 2797 7ff848f175c5-7ff848f17656 2795->2797 2798 7ff848f17578-7ff848f1758a 2796->2798 2799 7ff848f175af-7ff848f175c1 2796->2799 2805 7ff848f1765c-7ff848f1766b 2797->2805 2800 7ff848f1758c 2798->2800 2801 7ff848f1758e-7ff848f175a1 2798->2801 2799->2797 2800->2801 2801->2801 2803 7ff848f175a3-7ff848f175ab 2801->2803 2803->2799 2806 7ff848f1766d 2805->2806 2807 7ff848f17673-7ff848f176d8 call 7ff848f176f4 2805->2807 2806->2807 2814 7ff848f176da 2807->2814 2815 7ff848f176df-7ff848f176f3 2807->2815 2814->2815
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dcbb7f87b5a25c1015f46a9d8ad37e74eeee2a796f57eb4f53cfd04e845fa7a3
                          • Instruction ID: 1f05b74a982ef38d2920caa1c5c817c06edbfe3d423c48295226d00142aa7be9
                          • Opcode Fuzzy Hash: dcbb7f87b5a25c1015f46a9d8ad37e74eeee2a796f57eb4f53cfd04e845fa7a3
                          • Instruction Fuzzy Hash: DCF1923091CA8D8FEBA8EF28C8557E97BE1FF54350F04426EE84DC7295DB3499458B82

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2964 7ff848f17fe2-7ff848f17fef 2965 7ff848f17ffa-7ff848f180c7 2964->2965 2966 7ff848f17ff1-7ff848f17ff9 2964->2966 2970 7ff848f180c9-7ff848f180d2 2965->2970 2971 7ff848f18133 2965->2971 2966->2965 2970->2971 2973 7ff848f180d4-7ff848f180e0 2970->2973 2972 7ff848f18135-7ff848f1815a 2971->2972 2980 7ff848f1815c-7ff848f18165 2972->2980 2981 7ff848f181c6 2972->2981 2974 7ff848f18119-7ff848f18131 2973->2974 2975 7ff848f180e2-7ff848f180f4 2973->2975 2974->2972 2977 7ff848f180f8-7ff848f1810b 2975->2977 2978 7ff848f180f6 2975->2978 2977->2977 2979 7ff848f1810d-7ff848f18115 2977->2979 2978->2977 2979->2974 2980->2981 2982 7ff848f18167-7ff848f18173 2980->2982 2983 7ff848f181c8-7ff848f181ed 2981->2983 2984 7ff848f181ac-7ff848f181c4 2982->2984 2985 7ff848f18175-7ff848f18187 2982->2985 2989 7ff848f1825b 2983->2989 2990 7ff848f181ef-7ff848f181f9 2983->2990 2984->2983 2987 7ff848f18189 2985->2987 2988 7ff848f1818b-7ff848f1819e 2985->2988 2987->2988 2988->2988 2991 7ff848f181a0-7ff848f181a8 2988->2991 2993 7ff848f1825d-7ff848f1828b 2989->2993 2990->2989 2992 7ff848f181fb-7ff848f18208 2990->2992 2991->2984 2994 7ff848f1820a-7ff848f1821c 2992->2994 2995 7ff848f18241-7ff848f18259 2992->2995 3000 7ff848f182fb 2993->3000 3001 7ff848f1828d-7ff848f18298 2993->3001 2996 7ff848f1821e 2994->2996 2997 7ff848f18220-7ff848f18233 2994->2997 2995->2993 2996->2997 2997->2997 2999 7ff848f18235-7ff848f1823d 2997->2999 2999->2995 3002 7ff848f182fd-7ff848f183d5 3000->3002 3001->3000 3003 7ff848f1829a-7ff848f182a8 3001->3003 3013 7ff848f183db-7ff848f183ea 3002->3013 3004 7ff848f182aa-7ff848f182bc 3003->3004 3005 7ff848f182e1-7ff848f182f9 3003->3005 3006 7ff848f182be 3004->3006 3007 7ff848f182c0-7ff848f182d3 3004->3007 3005->3002 3006->3007 3007->3007 3009 7ff848f182d5-7ff848f182dd 3007->3009 3009->3005 3014 7ff848f183ec 3013->3014 3015 7ff848f183f2-7ff848f18454 call 7ff848f18470 3013->3015 3014->3015 3022 7ff848f1845b-7ff848f1846f 3015->3022 3023 7ff848f18456 3015->3023 3023->3022
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 331dfc5181ed06da9ada0c8e5539673e2ccfcdecab12d887f2ca1db4cffe57ff
                          • Instruction ID: 34ba940efe2b957074b6f0fe318ea21dab801ed54c0fd4efe07a070248c19a67
                          • Opcode Fuzzy Hash: 331dfc5181ed06da9ada0c8e5539673e2ccfcdecab12d887f2ca1db4cffe57ff
                          • Instruction Fuzzy Hash: D6E1B03091CA8E8FEBA8EF28C8557E977E1FF54350F54426ED84DC7291CB78A8448B85
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0ff113b2225774c4d4bbc80267548527a6b1d5498c17ad5854a17814360e2742
                          • Instruction ID: fa6d318c65c9c850b4aed1241660defb9bb2a8c753a4bf3aad5e011b7ab988eb
                          • Opcode Fuzzy Hash: 0ff113b2225774c4d4bbc80267548527a6b1d5498c17ad5854a17814360e2742
                          • Instruction Fuzzy Hash: 1DD1B131E7D5074EFBAAB338881627A7180DF64795F5416B8E44CC21D6FE1CAC1A87C6
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3f84869ecc41e98698a3d5fa260c4a383e8c76614fa8a77390ee8061f5687c11
                          • Instruction ID: c5c5877fd8e2fdfd9546ace81799ddcf29911a8856b2350f88dfbf31f63aed50
                          • Opcode Fuzzy Hash: 3f84869ecc41e98698a3d5fa260c4a383e8c76614fa8a77390ee8061f5687c11
                          • Instruction Fuzzy Hash: 4EE16F3191D3D30EE76B632888651657F609F53784F1901FBC5C9CB1E3EA1D6C1A83AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID: O_^:$O_^<
                          • API String ID: 0-648948556
                          • Opcode ID: a4874df344507d70b57002a135cc8d9971e9b3b54da6fea65361c9075d15847d
                          • Instruction ID: cb850fd44fadd0f3d823ecc071fddc7566284d46507f86367907c7fe1d2402c6
                          • Opcode Fuzzy Hash: a4874df344507d70b57002a135cc8d9971e9b3b54da6fea65361c9075d15847d
                          • Instruction Fuzzy Hash: C2E1EC17A1F5A2AAE25173B974550FA6B60FFC13B9F084677D18C8D0C39E0C688A42FD
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922225138.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff848f10000_loader.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4703d0c96efa688e46ed134d1dcab64fc946ac4ea0de8d81cd01fa3515080815
                          • Instruction ID: 26aa72bcd57616653fb08a96d55e4d3ccbfc47fb96fbaea512fcdf2b570c091d
                          • Opcode Fuzzy Hash: 4703d0c96efa688e46ed134d1dcab64fc946ac4ea0de8d81cd01fa3515080815
                          • Instruction Fuzzy Hash: 16418D31E0C2970EF7ABB32484552B53A909F51385FD445BAD48CC78DBEB0D6C6E42EA