Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ShadowLoader.exe

Overview

General Information

Sample name:ShadowLoader.exe
Analysis ID:1635816
MD5:77426a52b51ccd6684e2b3d1baab24d0
SHA1:18e4feb56511bb29f2a857ec33a0c0ebcdbb4d0c
SHA256:74c87f00f6a4752be3b17a9799d0e3df4187ff317e9735757c5d446f27d12a7d
Tags:exeuser-BastianHein
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to modify clipboard data
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ShadowLoader.exe (PID: 7660 cmdline: "C:\Users\user\Desktop\ShadowLoader.exe" MD5: 77426A52B51CCD6684E2B3D1BAAB24D0)
    • ShadowLoader.exe (PID: 7744 cmdline: "C:\Users\user\Desktop\ShadowLoader.exe" MD5: 77426A52B51CCD6684E2B3D1BAAB24D0)
    • WerFault.exe (PID: 7880 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 788 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["astralconnec.icu/DPowko", "begindecafer.world/QwdZdf", "garagedrootz.top/oPsoJAN", "modelshiverd.icu/bJhnsj", "arisechairedd.shop/JnsHY", "catterjur.run/boSnzhu", "orangemyther.live/IozZ", "fostinjec.today/LksNAz"], "Build id": "5de2dfd9707e99175a8227b8f37d09cb3d23f436cbcc486f9e91fcfa"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2547626693.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
    00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      3.2.ShadowLoader.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
        3.2.ShadowLoader.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          2.2.ShadowLoader.exe.3429550.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-12T02:09:20.214361+010020283713Unknown Traffic192.168.2.649697149.154.167.99443TCP
            2025-03-12T02:09:23.566807+010020283713Unknown Traffic192.168.2.64969892.122.104.90443TCP
            2025-03-12T02:09:26.431286+010020283713Unknown Traffic192.168.2.649701104.21.64.1443TCP
            2025-03-12T02:09:29.637397+010020283713Unknown Traffic192.168.2.64970492.122.104.90443TCP
            2025-03-12T02:09:32.462263+010020283713Unknown Traffic192.168.2.64970592.122.104.90443TCP
            2025-03-12T02:09:35.111756+010020283713Unknown Traffic192.168.2.649706104.21.64.1443TCP
            2025-03-12T02:09:37.859209+010020283713Unknown Traffic192.168.2.64970792.122.104.90443TCP
            2025-03-12T02:09:40.562907+010020283713Unknown Traffic192.168.2.649708104.21.64.1443TCP
            2025-03-12T02:09:41.885619+010020283713Unknown Traffic192.168.2.64970923.197.127.21443TCP
            2025-03-12T02:09:43.752627+010020283713Unknown Traffic192.168.2.64971023.197.127.21443TCP
            2025-03-12T02:09:46.410021+010020283713Unknown Traffic192.168.2.649711104.21.64.1443TCP
            2025-03-12T02:09:49.506873+010020283713Unknown Traffic192.168.2.64971223.197.127.21443TCP
            2025-03-12T02:09:52.388907+010020283713Unknown Traffic192.168.2.649713104.21.64.1443TCP
            2025-03-12T02:09:55.533499+010020283713Unknown Traffic192.168.2.64971423.197.127.21443TCP
            2025-03-12T02:09:58.398193+010020283713Unknown Traffic192.168.2.649715104.21.64.1443TCP
            2025-03-12T02:10:08.278936+010020283713Unknown Traffic192.168.2.64971892.122.104.90443TCP
            2025-03-12T02:10:11.340660+010020283713Unknown Traffic192.168.2.649719104.21.64.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-12T02:09:06.211920+010028032742Potentially Bad Traffic192.168.2.649690172.67.74.152443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: ShadowLoader.exeAvira: detected
            Source: begindecafer.world/QwdZdfAvira URL Cloud: Label: malware
            Source: fostinjec.today/LksNAzAvira URL Cloud: Label: malware
            Source: orangemyther.live/IozZAvira URL Cloud: Label: malware
            Source: arisechairedd.shop/JnsHYAvira URL Cloud: Label: malware
            Source: garagedrootz.top/oPsoJANAvira URL Cloud: Label: malware
            Source: astralconnec.icu/DPowkoAvira URL Cloud: Label: malware
            Source: catterjur.run/boSnzhuAvira URL Cloud: Label: malware
            Source: modelshiverd.icu/bJhnsjAvira URL Cloud: Label: malware
            Source: 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["astralconnec.icu/DPowko", "begindecafer.world/QwdZdf", "garagedrootz.top/oPsoJAN", "modelshiverd.icu/bJhnsj", "arisechairedd.shop/JnsHY", "catterjur.run/boSnzhu", "orangemyther.live/IozZ", "fostinjec.today/LksNAz"], "Build id": "5de2dfd9707e99175a8227b8f37d09cb3d23f436cbcc486f9e91fcfa"}
            Source: ShadowLoader.exeReversingLabs: Detection: 86%
            Source: ShadowLoader.exeVirustotal: Detection: 76%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
            Source: 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmpString decryptor: astralconnec.icu/DPowko
            Source: 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmpString decryptor: begindecafer.world/QwdZdf
            Source: 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmpString decryptor: garagedrootz.top/oPsoJAN
            Source: 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmpString decryptor: modelshiverd.icu/bJhnsj
            Source: 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmpString decryptor: arisechairedd.shop/JnsHY
            Source: 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmpString decryptor: catterjur.run/boSnzhu
            Source: 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmpString decryptor: orangemyther.live/IozZ
            Source: 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmpString decryptor: fostinjec.today/LksNAz
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041B889 CryptUnprotectData,3_2_0041B889
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00420C7F CryptUnprotectData,3_2_00420C7F
            Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.6:49697 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 92.122.104.90:443 -> 192.168.2.6:49698 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49701 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 92.122.104.90:443 -> 192.168.2.6:49704 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 92.122.104.90:443 -> 192.168.2.6:49705 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49706 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 92.122.104.90:443 -> 192.168.2.6:49707 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.197.127.21:443 -> 192.168.2.6:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.197.127.21:443 -> 192.168.2.6:49712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49713 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.197.127.21:443 -> 192.168.2.6:49714 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49715 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 92.122.104.90:443 -> 192.168.2.6:49718 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49719 version: TLS 1.2
            Source: ShadowLoader.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb source: ShadowLoader.exe
            Source: Binary string: Portals.pdb source: WERE60.tmp.dmp.6.dr
            Source: Binary string: System.Windows.Forms.pdb source: WERE60.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdb source: WERE60.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdbRSDS source: WERE60.tmp.dmp.6.dr
            Source: Binary string: mscorlib.ni.pdb source: WERE60.tmp.dmp.6.dr
            Source: Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb<;V; H;_CorExeMainmscoree.dll source: ShadowLoader.exe
            Source: Binary string: mscorlib.ni.pdbRSDS source: WERE60.tmp.dmp.6.dr
            Source: Binary string: Portals.pdbSystem.ni.dlln= source: WERE60.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdb source: WERE60.tmp.dmp.6.dr
            Source: Binary string: System.pdb source: WERE60.tmp.dmp.6.dr
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: number of queries: 1001
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then push edi3_2_00411055
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then cmp word ptr [edi+ebx], 0000h3_2_0044F0D0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], esi3_2_0044F1F0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ebp, byte ptr [esp+ecx-757A854Bh]3_2_00450290
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov word ptr [ecx], dx3_2_004504E0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+1D023CB4h]3_2_00450800
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov word ptr [esi], dx3_2_0041B889
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov dword ptr [esp+04h], eax3_2_0041B889
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-36F469BEh]3_2_0041B889
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+00000168h]3_2_0041B889
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+04h]3_2_0041A8B0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edx]3_2_0041292E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+616B0082h]3_2_0040EABE
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then jmp ecx3_2_0040EABE
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then jmp ecx3_2_0040EBE0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+10h]3_2_00421C80
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A566C0CEh3_2_00421C80
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0042DD7A
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ecx, byte ptr [ebx+eax-3EBE6F0Ch]3_2_0043806A
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00434032
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+10h]3_2_00434032
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00434032
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov byte ptr [ecx], bl3_2_00411151
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax+526739DEh]3_2_00411151
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov word ptr [edi], cx3_2_0042B160
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov byte ptr [ebx], cl3_2_0043919E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ebx, bx3_2_004301A3
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov byte ptr [edi], dl3_2_004371AD
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then jmp eax3_2_0041D25D
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_0040A200
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_0040A200
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then jmp eax3_2_004202DF
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_004242A6
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov word ptr [eax], dx3_2_00420347
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [eax]3_2_0042137A
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ecx, byte ptr [ebx]3_2_0040C310
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov eax, 31C91D1Eh3_2_0044C3ED
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax]3_2_00447390
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov byte ptr [edx], al3_2_0043A45B
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx-0027707Ah]3_2_004334F2
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+10h]3_2_00434560
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_00435500
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h3_2_0042A5C0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov byte ptr [ecx], dl3_2_0042459C
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ecx, byte ptr [edx+eax-2A3E6A48h]3_2_0044C59B
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ecx, word ptr [ebp+00h]3_2_00448641
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+04h]3_2_00448641
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax]3_2_00448641
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then push ebx3_2_0041264D
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0043765E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 743EDB10h3_2_0044F670
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+10h]3_2_0041C6B9
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-62h]3_2_0041C6B9
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov dword ptr [esi], edx3_2_004386BE
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov word ptr [eax], dx3_2_0041B700
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0041F715
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ecx, byte ptr [edx+eax-2A3E6A48h]3_2_0044C712
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-1005DACEh]3_2_004107D3
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_0041A7F0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-52h]3_2_00433857
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+04h]3_2_0044D850
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then push dword ptr [esp+0Ch]3_2_00434960
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-36F469BEh]3_2_0041B912
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+00000168h]3_2_0041B912
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+1D023CB4h]3_2_004509A0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-12797E7Eh]3_2_0042EA52
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+00000878h]3_2_0042EA52
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00442A50
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-0Eh]3_2_00410B5B
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov esi, edx3_2_0041DB0B
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-12797E7Eh]3_2_0042FB11
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+00000878h]3_2_0042FB11
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then cmp dword ptr [edx+ebx*8], 744E5843h3_2_0044ABF0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00437BBF
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+1AC89368h]3_2_0042AC40
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]3_2_0042AC40
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov dword ptr [esp+08h], edx3_2_0040FC90
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00433C93
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-36F469BEh]3_2_0041BD1D
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+00000168h]3_2_0041BD1D
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00437EF0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax]3_2_00448F76
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax]3_2_0044AF30
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 720EEED4h3_2_0044AFF0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]3_2_0044AFF0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+465A9F5Ch]3_2_00420F80
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0041EECC

            Networking

            barindex
            Source: Malware configuration extractorURLs: astralconnec.icu/DPowko
            Source: Malware configuration extractorURLs: begindecafer.world/QwdZdf
            Source: Malware configuration extractorURLs: garagedrootz.top/oPsoJAN
            Source: Malware configuration extractorURLs: modelshiverd.icu/bJhnsj
            Source: Malware configuration extractorURLs: arisechairedd.shop/JnsHY
            Source: Malware configuration extractorURLs: catterjur.run/boSnzhu
            Source: Malware configuration extractorURLs: orangemyther.live/IozZ
            Source: Malware configuration extractorURLs: fostinjec.today/LksNAz
            Source: global trafficHTTP traffic detected: GET /asdawfq HTTP/1.1Connection: Keep-AliveHost: t.me
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: Joe Sandbox ViewIP Address: 92.122.104.90 92.122.104.90
            Source: Joe Sandbox ViewIP Address: 23.197.127.21 23.197.127.21
            Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
            Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49710 -> 23.197.127.21:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49707 -> 92.122.104.90:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49697 -> 149.154.167.99:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49715 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49708 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49706 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49704 -> 92.122.104.90:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49712 -> 23.197.127.21:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49713 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49718 -> 92.122.104.90:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49701 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49705 -> 92.122.104.90:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49719 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49698 -> 92.122.104.90:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49714 -> 23.197.127.21:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49711 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49709 -> 23.197.127.21:443
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49690 -> 172.67.74.152:443
            Source: global trafficHTTP traffic detected: POST /gJKDA HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 65Host: exploreth.shop
            Source: global trafficHTTP traffic detected: POST /gJKDA HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=xYs7KzOyzO8Bc4gioO5User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 14938Host: exploreth.shop
            Source: global trafficHTTP traffic detected: POST /gJKDA HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=s413IMd7NJ1PuUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15089Host: exploreth.shop
            Source: global trafficHTTP traffic detected: POST /gJKDA HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=r0na2G62zDYPryulhUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19966Host: exploreth.shop
            Source: global trafficHTTP traffic detected: POST /gJKDA HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=7x2H155BWVhOqQpR1KUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2627Host: exploreth.shop
            Source: global trafficHTTP traffic detected: POST /gJKDA HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=12O5Zh29User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 586182Host: exploreth.shop
            Source: global trafficHTTP traffic detected: POST /gJKDA HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 103Host: exploreth.shop
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /asdawfq HTTP/1.1Connection: Keep-AliveHost: t.me
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: global trafficHTTP traffic detected: GET /profiles/76561199822375128 HTTP/1.1Connection: Keep-AliveHost: steamcommunity.com
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://steamloopback.host https://store.steampowered.com/; equals www.youtube.com (Youtube)
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policydefault-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://steamloopback.host https://store.steampowered.com/;X-Frame-OptionsSAMEORIGINPersistent-AuthWWW-AuthenticateVarysteamCountry=US%7C92a6885e6f9b14c4e43d76654e8007c1; path=/; secure; HttpOnly; SameSite=Nonesessionid=ada3a7da3dc8bdcb0d769d50; Path=/; Secure; SameSite=NoneSet-CookienginxServerRetry-AfterProxy-SupportProxy-AuthenticateP3PLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedMon, 26 Jul 1997 05:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset=UTF-8Content-Type35720Content-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerPragmaKeep-AliveWed, 12 Mar 2025 01:10:08 GMTDateProxy-ConnectioncloseConnectionno-cacheCache-Controlu equals www.youtube.com (Youtube)
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://steamloopback.host https://store.steampowered.com/; equals www.youtube.com (Youtube)
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: m/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://steamloopback.host https://store.steampowered.com/; equals www.youtube.com (Youtube)
            Source: global trafficDNS traffic detected: DNS query: t.me
            Source: global trafficDNS traffic detected: DNS query: astralconnec.icu
            Source: global trafficDNS traffic detected: DNS query: begindecafer.world
            Source: global trafficDNS traffic detected: DNS query: garagedrootz.top
            Source: global trafficDNS traffic detected: DNS query: modelshiverd.icu
            Source: global trafficDNS traffic detected: DNS query: arisechairedd.shop
            Source: global trafficDNS traffic detected: DNS query: catterjur.run
            Source: global trafficDNS traffic detected: DNS query: orangemyther.live
            Source: global trafficDNS traffic detected: DNS query: fostinjec.today
            Source: global trafficDNS traffic detected: DNS query: sterpickced.digital
            Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
            Source: global trafficDNS traffic detected: DNS query: exploreth.shop
            Source: unknownHTTP traffic detected: POST /gJKDA HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 65Host: exploreth.shop
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:27060
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
            Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://broadcast.st.dl.eccdnx.com
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkout.steampowered.com/
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fas
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=J1-T6FXbrr0Z&a
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=GlKQ1cghJWE2&amp;l=english&amp;_c
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&amp;l=english&a
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&amp;l=eng
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&amp;l=englis
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=jfdbROVe
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=0wL-
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=cMt-H-zOgNUp&amp;l=english&am
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&amp;l
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&amp;l=engl
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&amp;l=english&a
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&amp;l=english&a
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&amp;l=en
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&amp;l=eng
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&amp;l=e
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=whw8EcafG167&amp;l=e
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&amp;l=english&
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&amp;l=engl
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=Eq36AUaEgab8&amp;l=en
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&amp;
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/respons
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&amp
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=PCCoCNLxwF4M&am
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&amp;l=en
            Source: ShadowLoader.exe, 00000003.00000002.2548790483.0000000001396000.00000004.00000020.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://exploreth.shop/
            Source: ShadowLoader.exe, 00000003.00000002.2548790483.0000000001396000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://exploreth.shop/98
            Source: ShadowLoader.exe, 00000003.00000002.2548882084.00000000013C9000.00000004.00000020.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2548790483.0000000001396000.00000004.00000020.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2548611578.0000000001338000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://exploreth.shop/gJKDA
            Source: ShadowLoader.exe, 00000003.00000002.2548436396.0000000001315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://exploreth.shop:443/gJKDAal
            Source: ShadowLoader.exe, 00000003.00000002.2548436396.0000000001315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://exploreth.shop:443/gJKDAffxt.default-release/key4.dbPK
            Source: ShadowLoader.exe, 00000003.00000002.2548436396.0000000001315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://exploreth.shop:443/gJKDAofiles/76561199822375128ta
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/en/
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.steampowered.com/
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lv.queniujq.cn
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://medal.tv
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://player.vimeo.com
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net/recaptcha/;
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com;
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sketchfab.com
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steam.tv/
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast-test.akamaized.net
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast.akamaized.net
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcastchat.akamaized.net
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
            Source: ShadowLoader.exe, 00000003.00000002.2548882084.00000000013C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/AAAA
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/discussions/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199822375128
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/market/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/my/wishlist/
            Source: ShadowLoader.exe, 00000003.00000002.2548790483.0000000001396000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199822375128
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199822375128/badges
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199822375128/inventory/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/workshop/
            Source: ShadowLoader.exe, 00000003.00000002.2548436396.0000000001315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com:443/profiles/76561199822375128
            Source: ShadowLoader.exe, 00000003.00000002.2548436396.0000000001315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com:443/profiles/76561199822375128ta
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamloopback.host
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
            Source: ShadowLoader.exe, 00000003.00000002.2549398607.0000000003B38000.00000004.00000800.00020000.00000000.sdmp, ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;X-Frame-OptionsSAMEORIGINPersistent-AuthWWW-AuthenticateVarysteamCou
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/about/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/explore/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/mobile
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/news/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/points/shop/
            Source: ShadowLoader.exe, 00000003.00000002.2549193218.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/stats/
            Source: ShadowLoader.exe, 00000003.00000002.2548011816.00000000010FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://t.me
            Source: ShadowLoader.exe, 00000003.00000002.2548266398.00000000012E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/asdawfq
            Source: ShadowLoader.exe, 00000003.00000002.2548011816.00000000010FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://t.meawfq
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.cn/recaptcha/
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
            Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.6:49697 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 92.122.104.90:443 -> 192.168.2.6:49698 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49701 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 92.122.104.90:443 -> 192.168.2.6:49704 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 92.122.104.90:443 -> 192.168.2.6:49705 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49706 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 92.122.104.90:443 -> 192.168.2.6:49707 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.197.127.21:443 -> 192.168.2.6:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.197.127.21:443 -> 192.168.2.6:49712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49713 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.197.127.21:443 -> 192.168.2.6:49714 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49715 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 92.122.104.90:443 -> 192.168.2.6:49718 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49719 version: TLS 1.2
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00440D60 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,3_2_00440D60
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_038F1000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,3_2_038F1000
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00440D60 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,3_2_00440D60
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 2_2_00C426302_2_00C42630
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004171E03_2_004171E0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044F1F03_2_0044F1F0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004313403_2_00431340
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004463E03_2_004463E0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044A6703_2_0044A670
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004467303_2_00446730
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004157CD3_2_004157CD
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041B8893_2_0041B889
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0040B8B03_2_0040B8B0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041A8B03_2_0041A8B0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041292E3_2_0041292E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00439A833_2_00439A83
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0040EABE3_2_0040EABE
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00421C803_2_00421C80
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0042DD7A3_2_0042DD7A
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044CF503_2_0044CF50
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004010403_2_00401040
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044E06D3_2_0044E06D
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0040E0173_2_0040E017
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004340323_2_00434032
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004260303_2_00426030
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004111513_2_00411151
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004481503_2_00448150
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004331D43_2_004331D4
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004301A33_2_004301A3
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004291B03_2_004291B0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0043E1B03_2_0043E1B0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041D25D3_2_0041D25D
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004262603_2_00426260
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0043B2653_2_0043B265
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0040F27E3_2_0040F27E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0040A2003_2_0040A200
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0043235C3_2_0043235C
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0042137A3_2_0042137A
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0042D3793_2_0042D379
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0040C3103_2_0040C310
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004283113_2_00428311
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004473903_2_00447390
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0043C3A43_2_0043C3A4
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0043D4113_2_0043D411
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004094203_2_00409420
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044442D3_2_0044442D
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004034F03_2_004034F0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004334F23_2_004334F2
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0042E4803_2_0042E480
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041648E3_2_0041648E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0040D4A03_2_0040D4A0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004305503_2_00430550
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004345603_2_00434560
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044E5003_2_0044E500
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0042A5C03_2_0042A5C0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004405D03_2_004405D0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044E5E03_2_0044E5E0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004255803_2_00425580
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004486413_2_00448641
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044F6703_2_0044F670
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0040C6203_2_0040C620
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004146373_2_00414637
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041C6B93_2_0041C6B9
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004047723_2_00404772
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044E7003_2_0044E700
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041F7213_2_0041F721
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004317C03_2_004317C0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044E7903_2_0044E790
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004217953_2_00421795
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0042E7A03_2_0042E7A0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004338573_2_00433857
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044E8203_2_0044E820
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004138D13_2_004138D1
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004318D23_2_004318D2
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004478D03_2_004478D0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004258B03_2_004258B0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004289503_2_00428950
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041E9603_2_0041E960
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0043C9663_2_0043C966
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004309703_2_00430970
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041B9123_2_0041B912
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_004329D53_2_004329D5
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044F9E03_2_0044F9E0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0042EA523_2_0042EA52
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044DA0C3_2_0044DA0C
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00408A203_2_00408A20
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044EAD03_2_0044EAD0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00440AD03_2_00440AD0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00402AF03_2_00402AF0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0042DB703_2_0042DB70
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0042FB113_2_0042FB11
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00445B103_2_00445B10
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00438BD03_2_00438BD0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0043DBDD3_2_0043DBDD
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044ABF03_2_0044ABF0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0042AC403_2_0042AC40
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0040AC003_2_0040AC00
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00416CC53_2_00416CC5
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041CCE63_2_0041CCE6
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00443C893_2_00443C89
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0040FC903_2_0040FC90
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00438C9E3_2_00438C9E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00444CA03_2_00444CA0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0040CD703_2_0040CD70
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00407D103_2_00407D10
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041BD1D3_2_0041BD1D
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00438D223_2_00438D22
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00439E463_2_00439E46
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0041DE503_2_0041DE50
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0043EE513_2_0043EE51
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00433E503_2_00433E50
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044EE303_2_0044EE30
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00403E903_2_00403E90
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00408E903_2_00408E90
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0043CF363_2_0043CF36
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0043FFD23_2_0043FFD2
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044AFF03_2_0044AFF0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00420F803_2_00420F80
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044BF8B3_2_0044BF8B
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: String function: 0041A8A0 appears 100 times
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: String function: 0040B200 appears 50 times
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 788
            Source: ShadowLoader.exe, 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePortals.exe0 vs ShadowLoader.exe
            Source: ShadowLoader.exe, 00000002.00000000.1298887920.00000000000E6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePortals.exe0 vs ShadowLoader.exe
            Source: ShadowLoader.exe, 00000002.00000002.1423671025.00000000007FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ShadowLoader.exe
            Source: ShadowLoader.exeBinary or memory string: OriginalFilenamePortals.exe0 vs ShadowLoader.exe
            Source: ShadowLoader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: ShadowLoader.exeStatic PE information: Section: .CSS ZLIB complexity 1.0003268715421854
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/6@14/4
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00446730 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_00446730
            Source: C:\Users\user\Desktop\ShadowLoader.exeMutant created: NULL
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7660
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\b288d988-3a04-48de-979d-e8187879e917Jump to behavior
            Source: ShadowLoader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: ShadowLoader.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\ShadowLoader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: ShadowLoader.exeReversingLabs: Detection: 86%
            Source: ShadowLoader.exeVirustotal: Detection: 76%
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile read: C:\Users\user\Desktop\ShadowLoader.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\ShadowLoader.exe "C:\Users\user\Desktop\ShadowLoader.exe"
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess created: C:\Users\user\Desktop\ShadowLoader.exe "C:\Users\user\Desktop\ShadowLoader.exe"
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 788
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess created: C:\Users\user\Desktop\ShadowLoader.exe "C:\Users\user\Desktop\ShadowLoader.exe"Jump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: ShadowLoader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: ShadowLoader.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: ShadowLoader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb source: ShadowLoader.exe
            Source: Binary string: Portals.pdb source: WERE60.tmp.dmp.6.dr
            Source: Binary string: System.Windows.Forms.pdb source: WERE60.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdb source: WERE60.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdbRSDS source: WERE60.tmp.dmp.6.dr
            Source: Binary string: mscorlib.ni.pdb source: WERE60.tmp.dmp.6.dr
            Source: Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb<;V; H;_CorExeMainmscoree.dll source: ShadowLoader.exe
            Source: Binary string: mscorlib.ni.pdbRSDS source: WERE60.tmp.dmp.6.dr
            Source: Binary string: Portals.pdbSystem.ni.dlln= source: WERE60.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdb source: WERE60.tmp.dmp.6.dr
            Source: Binary string: System.pdb source: WERE60.tmp.dmp.6.dr
            Source: ShadowLoader.exeStatic PE information: 0xADFF511F [Mon Jul 3 22:20:15 2062 UTC]
            Source: ShadowLoader.exeStatic PE information: section name: .CSS
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0045722D push eax; ret 3_2_00457236
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00457237 push ecx; ret 3_2_00457252
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00457284 push ebx; ret 3_2_00457286
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00457290 push ebx; ret 3_2_00457292
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0045735C push ebp; ret 3_2_0045743A
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0045735C push ebp; ret 3_2_0045744E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00457450 push ebp; ret 3_2_00457452
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0045745C push ebp; ret 3_2_0045745E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00457459 push ebp; ret 3_2_0045745A
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00457463 push ebp; ret 3_2_00457466
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00457469 push esp; ret 3_2_0045746A
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00457470 push esp; ret 3_2_00457482
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0045742C push ebp; ret 3_2_0045743A
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0045743F push ebp; ret 3_2_0045744E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00456D60 push eax; ret 3_2_00456D62
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00456D63 push ecx; ret 3_2_00456D6A
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00456D6C push ecx; ret 3_2_00456D6E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00456D7C push ebx; ret 3_2_00456D82
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00456DF8 push ss; ret 3_2_00456DF9
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00456DAF push edx; ret 3_2_00456DB2
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00454DA9 push edi; iretd 3_2_00454DDF
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00456E45 push esp; ret 3_2_00456E46
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00456E4C push esi; ret 3_2_00456E52
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00456E54 push ebp; ret 3_2_00456E5E
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_00456E90 push ecx; ret 3_2_00456E96
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\ShadowLoader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\ShadowLoader.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeMemory allocated: C40000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeMemory allocated: 2420000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeMemory allocated: 4420000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeWindow / User API: threadDelayed 4208Jump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exe TID: 7764Thread sleep time: -150000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exe TID: 7328Thread sleep count: 4208 > 30Jump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: C:\Users\user\Desktop\ShadowLoader.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\ShadowLoader.exeLast function: Thread delayed
            Source: Amcache.hve.6.drBinary or memory string: VMware
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
            Source: ShadowLoader.exe, 00000003.00000002.2548611578.0000000001338000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.6.drBinary or memory string: vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.6.drBinary or memory string: VMware20,1
            Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: ShadowLoader.exe, 00000003.00000002.2548266398.00000000012FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWpG4
            Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Users\user\Desktop\ShadowLoader.exeAPI call chain: ExitProcess graph end nodegraph_3-23704
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 3_2_0044C8F0 LdrInitializeThunk,3_2_0044C8F0
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 2_2_0242216D mov edi, dword ptr fs:[00000030h]2_2_0242216D
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 2_2_024222EA mov edi, dword ptr fs:[00000030h]2_2_024222EA
            Source: C:\Users\user\Desktop\ShadowLoader.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\ShadowLoader.exeCode function: 2_2_0242216D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,2_2_0242216D
            Source: C:\Users\user\Desktop\ShadowLoader.exeMemory written: C:\Users\user\Desktop\ShadowLoader.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeProcess created: C:\Users\user\Desktop\ShadowLoader.exe "C:\Users\user\Desktop\ShadowLoader.exe"Jump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeQueries volume information: C:\Users\user\Desktop\ShadowLoader.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.6.dr, Amcache.hve.LOG1.6.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.6.dr, Amcache.hve.LOG1.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
            Source: ShadowLoader.exe, 00000003.00000002.2548611578.0000000001338000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: Amcache.hve.6.dr, Amcache.hve.LOG1.6.drBinary or memory string: MsMpEng.exe
            Source: C:\Users\user\Desktop\ShadowLoader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 3.2.ShadowLoader.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.ShadowLoader.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.ShadowLoader.exe.3429550.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.2547626693.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: ShadowLoader.exe, 00000003.00000002.2548611578.0000000001338000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
            Source: ShadowLoader.exe, 00000003.00000002.2548611578.0000000001338000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
            Source: ShadowLoader.exe, 00000003.00000002.2548611578.0000000001338000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
            Source: ShadowLoader.exe, 00000003.00000002.2548722546.000000000138C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ,"fs":20971520},{"t":0,"p":"%appdata%\\com.liberty.jaxx\\IndexedDB","m":["*"
            Source: ShadowLoader.exe, 00000003.00000002.2548611578.0000000001338000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\YPSIACHYXWJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\YPSIACHYXWJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
            Source: C:\Users\user\Desktop\ShadowLoader.exeDirectory queried: number of queries: 1001

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 3.2.ShadowLoader.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.ShadowLoader.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.ShadowLoader.exe.3429550.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.2547626693.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1425454940.0000000003429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
            Windows Management Instrumentation
            1
            DLL Side-Loading
            211
            Process Injection
            23
            Virtualization/Sandbox Evasion
            2
            OS Credential Dumping
            231
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory23
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol41
            Data from Local System
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)211
            Process Injection
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            3
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Deobfuscate/Decode Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture114
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets2
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Software Packing
            Cached Domain Credentials22
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Timestomp
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.