Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ref#103052.exe

Overview

General Information

Sample name:Ref#103052.exe
Analysis ID:1586494
MD5:bac93b85bd7054a23583f29d19fe4206
SHA1:58e5d1d350f8ed03bf70a9d1c4295677b5f9eae3
SHA256:462e6b70a2eb82a0b3daf58c079e6df3a1360081059220e5832b8c0cffa51b33
Tags:exeuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • Ref#103052.exe (PID: 820 cmdline: "C:\Users\user\Desktop\Ref#103052.exe" MD5: BAC93B85BD7054A23583F29D19FE4206)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Ref#103052.exeAvira: detected
Source: Ref#103052.exeVirustotal: Detection: 56%Perma Link
Source: Ref#103052.exeReversingLabs: Detection: 57%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: Ref#103052.exeJoe Sandbox ML: detected
Source: Ref#103052.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Ref#103052.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 5.253.86.15 5.253.86.15
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: oshi.at
Source: Ref#103052.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: Ref#103052.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: Ref#103052.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: Ref#103052.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: Ref#103052.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: Ref#103052.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: Ref#103052.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: Ref#103052.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: Ref#103052.exe, 00000000.00000002.3693342474.0000000002AE9000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AA0000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A98000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A93000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AEE000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AC0000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oshi.at
Source: Ref#103052.exe, 00000000.00000002.3693342474.0000000002AE9000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AA0000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A98000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A93000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AEE000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AC0000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oshi.atd
Source: Ref#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Ref#103052.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: Ref#103052.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: Ref#103052.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: Ref#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at
Source: Ref#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AEE000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/STEq
Source: Ref#103052.exeString found in binary or memory: https://oshi.at/STEqM
Source: Ref#103052.exe, 00000000.00000002.3693342474.0000000002AE9000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A7C000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AA0000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A98000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AEE000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.atD
Source: Ref#103052.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49984
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49983
Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49982
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49984 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49982 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49976
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49975
Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49983 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49923
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49989
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987
Source: C:\Users\user\Desktop\Ref#103052.exeProcess Stats: CPU usage > 49%
Source: Ref#103052.exeStatic PE information: invalid certificate
Source: Ref#103052.exe, 00000000.00000002.3693023580.0000000000EAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Ref#103052.exe
Source: Ref#103052.exe, 00000000.00000000.1242372510.000000000069E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameege.exe: vs Ref#103052.exe
Source: Ref#103052.exeBinary or memory string: OriginalFilenameege.exe: vs Ref#103052.exe
Source: Ref#103052.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\Ref#103052.exeMutant created: NULL
Source: Ref#103052.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Ref#103052.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\Ref#103052.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Ref#103052.exeVirustotal: Detection: 56%
Source: Ref#103052.exeReversingLabs: Detection: 57%
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Ref#103052.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Ref#103052.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeMemory allocated: DF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeMemory allocated: 29F0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeMemory allocated: 2940000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeWindow / User API: threadDelayed 7133Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeWindow / User API: threadDelayed 2710Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep count: 40 > 30Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -36893488147419080s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 5996Thread sleep count: 7133 > 30Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 5996Thread sleep count: 2710 > 30Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -99890s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -99781s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -99670s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -99562s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -99447s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -99344s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -99234s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -99125s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -99015s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -98905s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -98796s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -98687s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -98578s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -98369s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -98263s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -98155s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -98042s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -97937s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -97828s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -97716s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -97609s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -97497s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -97390s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -97281s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -97172s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -97062s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -96953s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -96843s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -96733s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -96625s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -96515s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -96406s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -96297s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -96187s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -96078s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -95968s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -95859s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -95748s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -95604s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -95498s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -95390s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -95273s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -95172s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -95062s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -94953s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -94843s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exe TID: 2436Thread sleep time: -94734s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 99890Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 99781Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 99670Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 99562Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 99447Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 99344Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 99234Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 99125Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 99015Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 98905Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 98796Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 98687Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 98578Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 98369Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 98263Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 98155Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 98042Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 97937Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 97828Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 97716Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 97609Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 97497Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 97390Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 97281Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 97172Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 97062Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 96953Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 96843Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 96733Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 96625Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 96515Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 96406Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 96297Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 96187Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 96078Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 95968Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 95859Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 95748Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 95604Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 95498Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 95390Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 95273Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 95172Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 95062Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 94953Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 94843Jump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeThread delayed: delay time: 94734Jump to behavior
Source: Ref#103052.exe, 00000000.00000002.3693023580.0000000000F1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Ref#103052.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeQueries volume information: C:\Users\user\Desktop\Ref#103052.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Ref#103052.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Ref#103052.exe57%VirustotalBrowse
Ref#103052.exe58%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
Ref#103052.exe100%AviraHEUR/AGEN.1323669
Ref#103052.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://oshi.at0%Avira URL Cloudsafe
https://oshi.at/STEqM0%Avira URL Cloudsafe
https://oshi.at/STEq0%Avira URL Cloudsafe
http://oshi.atd0%Avira URL Cloudsafe
https://oshi.atD0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
oshi.at
5.253.86.15
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://oshi.at/STEqMRef#103052.exefalse
    • Avira URL Cloud: safe
    unknown
    http://oshi.atdRef#103052.exe, 00000000.00000002.3693342474.0000000002AE9000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AA0000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A98000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A93000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AEE000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AC0000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A71000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://oshi.atRef#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://oshi.at/STEqRef#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AEE000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AC0000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://oshi.atRef#103052.exe, 00000000.00000002.3693342474.0000000002AE9000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AA0000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A98000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A93000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AEE000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AC0000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A71000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://oshi.atDRef#103052.exe, 00000000.00000002.3693342474.0000000002AE9000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A7C000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AA0000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002A98000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AEE000.00000004.00000800.00020000.00000000.sdmp, Ref#103052.exe, 00000000.00000002.3693342474.0000000002AC0000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRef#103052.exe, 00000000.00000002.3693342474.0000000002A4C000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        5.253.86.15
        oshi.atCyprus
        208046HOSTSLICK-GERMANYNLfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1586494
        Start date and time:2025-01-09 08:18:39 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 6s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:13
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Ref#103052.exe
        Detection:MAL
        Classification:mal64.winEXE@1/0@1/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 14
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240000 for current running targets taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target Ref#103052.exe, PID 820 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        02:19:32API Interceptor11617629x Sleep call for process: Ref#103052.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        5.253.86.15Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
          Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
            Ref_31020563.exeGet hashmaliciousUnknownBrowse
              Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                Ref#1550238.exeGet hashmaliciousUnknownBrowse
                  JuneOrder.exeGet hashmaliciousAsyncRAT, Babadeda, PureLog Stealer, zgRATBrowse
                    TamenuV11.msiGet hashmaliciousUnknownBrowse
                      9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
                        9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
                          PAYMENT_RECEIPT_STAN100699.exeGet hashmaliciousUnknownBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            oshi.at9876567899.bat.exeGet hashmaliciousLokibotBrowse
                            • 194.15.112.248
                            Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
                            • 5.253.86.15
                            Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                            • 5.253.86.15
                            Ref_31020563.exeGet hashmaliciousUnknownBrowse
                            • 194.15.112.248
                            Ref_31020563.exeGet hashmaliciousUnknownBrowse
                            • 5.253.86.15
                            Ref#116670.exeGet hashmaliciousMassLogger RATBrowse
                            • 194.15.112.248
                            Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                            • 194.15.112.248
                            Ref#1550238.exeGet hashmaliciousAgentTeslaBrowse
                            • 194.15.112.248
                            Ref#1550238.exeGet hashmaliciousUnknownBrowse
                            • 5.253.86.15
                            Swift Payment MT103.lnkGet hashmaliciousUnknownBrowse
                            • 188.241.120.6
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            HOSTSLICK-GERMANYNLRef#66001032.exeGet hashmaliciousAgentTeslaBrowse
                            • 5.253.86.15
                            Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                            • 5.253.86.15
                            Ref_31020563.exeGet hashmaliciousUnknownBrowse
                            • 5.253.86.15
                            Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                            • 5.253.86.15
                            Ref#1550238.exeGet hashmaliciousUnknownBrowse
                            • 5.253.86.15
                            an_api.exeGet hashmaliciousUnknownBrowse
                            • 193.142.146.64
                            licarisan_api.exeGet hashmaliciousIcarusBrowse
                            • 193.142.146.64
                            an_api.exeGet hashmaliciousUnknownBrowse
                            • 193.142.146.64
                            build.exeGet hashmaliciousUnknownBrowse
                            • 193.142.146.64
                            ub16vsLP6y.zipGet hashmaliciousRemcosBrowse
                            • 193.142.146.203
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):5.700208074482842
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                            • Win32 Executable (generic) a (10002005/4) 49.97%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:Ref#103052.exe
                            File size:73'848 bytes
                            MD5:bac93b85bd7054a23583f29d19fe4206
                            SHA1:58e5d1d350f8ed03bf70a9d1c4295677b5f9eae3
                            SHA256:462e6b70a2eb82a0b3daf58c079e6df3a1360081059220e5832b8c0cffa51b33
                            SHA512:41402f83c44f31b7488370fc97430c681e2a1dcd00030603a54d010e9355a51d9e6c3c2378c170a325066c8043d02ed282dc9238ecc2cbce52f6e14fc638c411
                            SSDEEP:1536:TI0F47ioMfqriq2XelxUKzgTL/iQ263s+/iJ/mH:haJAr/2/Y
                            TLSH:547319026698C252D2545B3ED8E244704770FEA2AB97DA0F34FA3F297437F649A4731E
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....|g.....................J......N.... ........@.. .......................`............`................................
                            Icon Hash:23d8d8d4d4d85007
                            Entrypoint:0x40c44e
                            Entrypoint Section:.text
                            Digitally signed:true
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x677CDCF8 [Tue Jan 7 07:51:20 2025 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Signature Valid:false
                            Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                            Signature Validation Error:The digital signature of the object did not verify
                            Error Number:-2146869232
                            Not Before, Not After
                            • 19/10/2023 11:33:01 19/10/2024 11:33:01
                            Subject Chain
                            • CN=Helpfeel Inc, OU=\u958b\u767a\u90e8, O=Helpfeel Inc, STREET=110-16 Goshohachiman-cho, L="Kyoto-shi, Kamigyo-ku", S=Kyoto, C=JP, OID.1.3.6.1.4.1.311.60.2.1.3=JP, SERIALNUMBER=1300-01-068185, OID.2.5.4.15=Private Organization
                            Version:3
                            Thumbprint MD5:0D966BC363CD56690E80EE36566E3C7B
                            Thumbprint SHA-1:A955D2CBD3F7D394053A3C5219A93AF13917EA0D
                            Thumbprint SHA-256:2362CABC8423B1EE01F2DE0F40197E509F8FA6DCF631E687EDB44792B241E526
                            Serial:138A5335DB02BAFDC71DC47A
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc4000x4b.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x46dc.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0xf2000x2e78.rsrc
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xa4540xa600b6a7b4db82fec023dfba350382edc8e4False0.5067771084337349data5.831882654064662IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xe0000x46dc0x480075b1bcac89a65b6fc51be0b17eed7686False0.06743706597222222data2.187267186961394IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x140000xc0x2002be470437558e134270c32f689ac0765False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xe1300x4028Device independent bitmap graphic, 64 x 128 x 32, image size 00.029286410131514857
                            RT_GROUP_ICON0x121580x14data1.05
                            RT_VERSION0x1216c0x384data0.42
                            RT_MANIFEST0x124f00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 9, 2025 08:19:33.362185001 CET49703443192.168.2.75.253.86.15
                            Jan 9, 2025 08:19:33.362234116 CET443497035.253.86.15192.168.2.7
                            Jan 9, 2025 08:19:33.362312078 CET49703443192.168.2.75.253.86.15
                            Jan 9, 2025 08:19:33.375073910 CET49703443192.168.2.75.253.86.15
                            Jan 9, 2025 08:19:33.375093937 CET443497035.253.86.15192.168.2.7
                            Jan 9, 2025 08:20:16.147885084 CET443497035.253.86.15192.168.2.7
                            Jan 9, 2025 08:20:16.147973061 CET49703443192.168.2.75.253.86.15
                            Jan 9, 2025 08:20:16.161475897 CET49703443192.168.2.75.253.86.15
                            Jan 9, 2025 08:20:16.161499977 CET443497035.253.86.15192.168.2.7
                            Jan 9, 2025 08:20:16.176482916 CET49923443192.168.2.75.253.86.15
                            Jan 9, 2025 08:20:16.176516056 CET443499235.253.86.15192.168.2.7
                            Jan 9, 2025 08:20:16.176599979 CET49923443192.168.2.75.253.86.15
                            Jan 9, 2025 08:20:16.176956892 CET49923443192.168.2.75.253.86.15
                            Jan 9, 2025 08:20:16.176973104 CET443499235.253.86.15192.168.2.7
                            Jan 9, 2025 08:20:58.930218935 CET443499235.253.86.15192.168.2.7
                            Jan 9, 2025 08:20:58.931808949 CET49923443192.168.2.75.253.86.15
                            Jan 9, 2025 08:20:58.940531015 CET49923443192.168.2.75.253.86.15
                            Jan 9, 2025 08:20:58.940565109 CET443499235.253.86.15192.168.2.7
                            Jan 9, 2025 08:20:58.948538065 CET49975443192.168.2.75.253.86.15
                            Jan 9, 2025 08:20:58.948627949 CET443499755.253.86.15192.168.2.7
                            Jan 9, 2025 08:20:58.952040911 CET49975443192.168.2.75.253.86.15
                            Jan 9, 2025 08:20:58.952040911 CET49975443192.168.2.75.253.86.15
                            Jan 9, 2025 08:20:58.952112913 CET443499755.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:37.522222996 CET49975443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:37.522358894 CET443499755.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:37.522445917 CET49975443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:37.528558969 CET49976443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:37.528604984 CET443499765.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:37.528729916 CET49976443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:37.529243946 CET49976443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:37.529258013 CET443499765.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:38.439240932 CET49976443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:38.440836906 CET49977443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:38.440890074 CET443499775.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:38.440948009 CET49977443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:38.441248894 CET49977443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:38.441268921 CET443499775.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:38.483333111 CET443499765.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:52.970419884 CET49977443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:52.972697020 CET49978443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:52.972740889 CET443499785.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:52.972824097 CET49978443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:52.973236084 CET49978443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:52.973244905 CET443499785.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:53.015341997 CET443499775.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:55.314645052 CET49978443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:55.315583944 CET49979443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:55.315654039 CET443499795.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:55.315809965 CET49979443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:55.316073895 CET49979443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:55.316083908 CET443499795.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:55.359333038 CET443499785.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:57.751725912 CET49979443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:57.753633976 CET49980443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:57.753686905 CET443499805.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:57.754056931 CET49980443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:57.754548073 CET49980443192.168.2.75.253.86.15
                            Jan 9, 2025 08:21:57.754558086 CET443499805.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:57.795336008 CET443499795.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:58.921344042 CET443499765.253.86.15192.168.2.7
                            Jan 9, 2025 08:21:58.921432972 CET49976443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:00.895478010 CET443499775.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:00.895560026 CET49977443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:00.985991955 CET49980443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:00.987489939 CET49981443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:00.987548113 CET443499815.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:00.987657070 CET49981443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:00.987951994 CET49981443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:00.987965107 CET443499815.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:01.031337023 CET443499805.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:11.580616951 CET49981443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:11.584636927 CET49982443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:11.584688902 CET443499825.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:11.584913969 CET49982443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:11.588193893 CET49982443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:11.588207960 CET443499825.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:11.627337933 CET443499815.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:14.359774113 CET443499785.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:14.359838963 CET49978443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:16.517256975 CET49982443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:16.519259930 CET49983443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:16.519309998 CET443499835.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:16.519368887 CET49983443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:16.519793034 CET49983443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:16.519805908 CET443499835.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:16.563328028 CET443499825.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:16.687120914 CET443499795.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:16.687180996 CET49979443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:19.126421928 CET443499805.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:19.129224062 CET49980443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:22.358933926 CET443499815.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:22.358982086 CET49981443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:32.986325979 CET443499825.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:32.986407042 CET49982443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:33.407854080 CET49983443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:33.412769079 CET49984443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:33.412817955 CET443499845.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:33.413139105 CET49984443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:33.413429022 CET49984443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:33.413445950 CET443499845.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:33.451332092 CET443499835.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:37.890913010 CET443499835.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:37.892086983 CET49983443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:42.251770020 CET49984443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:42.253731012 CET49985443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:42.253772020 CET443499855.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:42.253844976 CET49985443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:42.254405975 CET49985443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:42.254420996 CET443499855.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:42.295329094 CET443499845.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:44.486300945 CET49985443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:44.489012957 CET49986443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:44.489048004 CET443499865.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:44.489104033 CET49986443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:44.489504099 CET49986443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:44.489516973 CET443499865.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:44.527343988 CET443499855.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:50.768125057 CET49986443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:50.777245998 CET49987443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:50.777282953 CET443499875.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:50.777347088 CET49987443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:50.777715921 CET49987443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:50.777729034 CET443499875.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:50.815337896 CET443499865.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:54.787113905 CET443499845.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:54.787199974 CET49984443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:55.142465115 CET49987443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:55.143830061 CET49988443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:55.143893003 CET443499885.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:55.143975973 CET49988443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:55.144246101 CET49988443192.168.2.75.253.86.15
                            Jan 9, 2025 08:22:55.144263983 CET443499885.253.86.15192.168.2.7
                            Jan 9, 2025 08:22:55.183340073 CET443499875.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:03.610532045 CET443499855.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:03.612731934 CET49985443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:05.860011101 CET443499865.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:05.860749006 CET49986443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:09.142577887 CET49988443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:09.144143105 CET49989443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:09.144206047 CET443499895.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:09.144361019 CET49989443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:09.144736052 CET49989443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:09.144753933 CET443499895.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:09.183336973 CET443499885.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:12.158863068 CET443499875.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:12.160821915 CET49987443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:16.555785894 CET443499885.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:16.555871964 CET49988443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:22.736329079 CET49989443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:22.739152908 CET49990443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:22.739211082 CET443499905.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:22.739290953 CET49990443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:22.739712000 CET49990443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:22.739727020 CET443499905.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:22.779337883 CET443499895.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:30.516581059 CET443499895.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:30.516633987 CET49989443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:33.318715096 CET49990443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:33.318720102 CET49991443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:33.318794966 CET443499915.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:33.321067095 CET49991443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:33.321067095 CET49991443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:33.321104050 CET443499915.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:33.359333038 CET443499905.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:36.316333055 CET49991443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:36.319119930 CET49992443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:36.319163084 CET443499925.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:36.319219112 CET49992443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:36.320050001 CET49992443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:36.320060015 CET443499925.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:36.363328934 CET443499915.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:38.171195030 CET49992443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:38.172499895 CET49993443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:38.172554970 CET443499935.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:38.172652006 CET49993443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:38.176701069 CET49993443192.168.2.75.253.86.15
                            Jan 9, 2025 08:23:38.176711082 CET443499935.253.86.15192.168.2.7
                            Jan 9, 2025 08:23:38.215337038 CET443499925.253.86.15192.168.2.7
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 9, 2025 08:19:33.159050941 CET5154653192.168.2.71.1.1.1
                            Jan 9, 2025 08:19:33.320911884 CET53515461.1.1.1192.168.2.7
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 9, 2025 08:19:33.159050941 CET192.168.2.71.1.1.10xbe9eStandard query (0)oshi.atA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 9, 2025 08:19:33.320911884 CET1.1.1.1192.168.2.70xbe9eNo error (0)oshi.at5.253.86.15A (IP address)IN (0x0001)false
                            Jan 9, 2025 08:19:33.320911884 CET1.1.1.1192.168.2.70xbe9eNo error (0)oshi.at194.15.112.248A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:02:19:32
                            Start date:09/01/2025
                            Path:C:\Users\user\Desktop\Ref#103052.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Ref#103052.exe"
                            Imagebase:0x690000
                            File size:73'848 bytes
                            MD5 hash:BAC93B85BD7054A23583F29D19FE4206
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            Reset < >
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID: Teq
                              • API String ID: 0-1098410595
                              • Opcode ID: faf9401988c5dc7af99812f89ea4631e69976815d714670fa8d1b2961d9d0e5a
                              • Instruction ID: 25071ffc5bb47757e20b57bf0baa46a2a4872e544b2569426034cc687ec70c53
                              • Opcode Fuzzy Hash: faf9401988c5dc7af99812f89ea4631e69976815d714670fa8d1b2961d9d0e5a
                              • Instruction Fuzzy Hash: 098190347003089FC704AB69D855B6DBFF2EF89310F1984AAE509CB3A6DB759C05CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ca79ec44aab8c387a10fa69224e2e8bdeec86b67ff046bd01c1b989a0219bf6f
                              • Instruction ID: f371b868e77fedcc26dbf11d0cd30b832f86cfa8a9366ff034e3642c36efe06c
                              • Opcode Fuzzy Hash: ca79ec44aab8c387a10fa69224e2e8bdeec86b67ff046bd01c1b989a0219bf6f
                              • Instruction Fuzzy Hash: 3F41B338604209CFCB15AF28C4557BD73A3EFC6311F198568D10A8F298DB789C8ACBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c91da81bca144338840de8b848c7dc5b58097fa00239bafb35332feb4475a6d9
                              • Instruction ID: 969bfa72e05f9fee7e6bf87cac26994876884da33c9d9a17d2194f0829a19398
                              • Opcode Fuzzy Hash: c91da81bca144338840de8b848c7dc5b58097fa00239bafb35332feb4475a6d9
                              • Instruction Fuzzy Hash: 64318E38604209CFCB15EF68D4557BD73A3EBC6311F1A8168D10A8F298DB789C8ADB61
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 09c12c8fa825bfe007388dc05bd46b6463d8f0510a2078458cabf8be6e6be882
                              • Instruction ID: 3068bc1f0b3fc716b0ad9abef64ec2a4cddb5cbe68e31f87b38822758c1bf7e1
                              • Opcode Fuzzy Hash: 09c12c8fa825bfe007388dc05bd46b6463d8f0510a2078458cabf8be6e6be882
                              • Instruction Fuzzy Hash: CC312770D0124C9FDB24CFA9C490AEEBFF5AF48310F658429E915AB350DB749945CFA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e974adb0b09c912f7b06d64273426760930f6669ffca353470bcc2def420106a
                              • Instruction ID: d5853cdf91eab4916bff26d3627340839a8a78d74dc9680554e3a475e6337b3c
                              • Opcode Fuzzy Hash: e974adb0b09c912f7b06d64273426760930f6669ffca353470bcc2def420106a
                              • Instruction Fuzzy Hash: 90311570D0124C9FDB24CFA9C580AEEBFF5AF48310F258429E919AB350DB349945CFA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d024ef060f28703f43ba598692a770f64e21c2732e2e645f4836d55d75b632ba
                              • Instruction ID: 188d0f4b4d7ec350a06943d7a1b03caddb23e1059f6efd3f0c6f98fd12e37b3f
                              • Opcode Fuzzy Hash: d024ef060f28703f43ba598692a770f64e21c2732e2e645f4836d55d75b632ba
                              • Instruction Fuzzy Hash: FC214838604219CFCF15AB68D05567C33A3EFCA725F158429D1068B294DB759C8ACBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9b50c9d640af13368bbf7efb7d4aa52195353ff707d5d8595b0737ca31325e5a
                              • Instruction ID: f47237db1b183b6d73b775b4adec407f4d573afe01b2466fa94161f2303bf384
                              • Opcode Fuzzy Hash: 9b50c9d640af13368bbf7efb7d4aa52195353ff707d5d8595b0737ca31325e5a
                              • Instruction Fuzzy Hash: 0E11AC307003049FD704A77A9854B29BBA2EFCA365F1984A9E149CF3A6DE65DC06C7A1
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692582317.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d9d000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0e28a12c55e3c00609791de650ad6458ea798a676f43c3a14b165e8474610122
                              • Instruction ID: 486fb2a619712b6eb9d68cd975d92b206e0d787d5bb4800ad2f2cc12ad862011
                              • Opcode Fuzzy Hash: 0e28a12c55e3c00609791de650ad6458ea798a676f43c3a14b165e8474610122
                              • Instruction Fuzzy Hash: 6B012631108340AFEB209AA5CDC4B66BF99DF41735F18C41AED4A0F282C678DC44CAB2
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1d59bf5388c697d93fba17c57a8a096391e189d1de893e42302fa2488748e32a
                              • Instruction ID: 66379f69e682f09d71854777d65741dbf0e360b640c4e153785e8e4724d928c7
                              • Opcode Fuzzy Hash: 1d59bf5388c697d93fba17c57a8a096391e189d1de893e42302fa2488748e32a
                              • Instruction Fuzzy Hash: 77018F383043149FC740AB69D544B597BA2FF8A725B1985A5D049CF366DB70EC06CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692582317.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d9d000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c22bf3a8ada625db7bbbbfc04a5f800a56ee95594d700bf38ec44b4d42fe442d
                              • Instruction ID: 4e2d7bd01208d650b4376ad9fb97042227fea38a283e621cbf81e2598874b9a7
                              • Opcode Fuzzy Hash: c22bf3a8ada625db7bbbbfc04a5f800a56ee95594d700bf38ec44b4d42fe442d
                              • Instruction Fuzzy Hash: A2F0F6310043409EEB208E19CC84B62FFA8EB51734F18C05AED094F292C3789C40CBB1
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ee730ff91be83efc5286613d4a73a34d5c1aaec3b41d153d2cb555507e5ea5f1
                              • Instruction ID: c97b3db3c726f7f16326b2c2b0cec5d52f674eb7a9ae7fb3fbb1ac846002f0ad
                              • Opcode Fuzzy Hash: ee730ff91be83efc5286613d4a73a34d5c1aaec3b41d153d2cb555507e5ea5f1
                              • Instruction Fuzzy Hash: D4D0A739A08224CBDB106B24DC6137C7B649F45341F4E4920CA565B205E7606D4586B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7c7d165afc7b618d456bdbc89301aa84f468ce6cfc345754bc8482fb9e63373b
                              • Instruction ID: b63edec4743335c6d42f1626fd12a183487f5cbae1d5583eb5ad6a520c085ff2
                              • Opcode Fuzzy Hash: 7c7d165afc7b618d456bdbc89301aa84f468ce6cfc345754bc8482fb9e63373b
                              • Instruction Fuzzy Hash: 90C0013004A3C28FCB821B6E98240843FB0AE5326832A58E2D4C08B5B6CB200A18DB22
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 344d776a4f1389161971e2c9e4f891d29025197abe4a695ea96ad895fd364a7d
                              • Instruction ID: a6370ee01a77342209fe6d9dd88a8593a8f12753c71feadec816dfed87622011
                              • Opcode Fuzzy Hash: 344d776a4f1389161971e2c9e4f891d29025197abe4a695ea96ad895fd364a7d
                              • Instruction Fuzzy Hash: 0EB0923B5CD2885FCB1047A56C895E87F604A6511930D8369D84A82A13D1EA400A8910
                              Memory Dump Source
                              • Source File: 00000000.00000002.3692806013.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_df0000_Ref#103052.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: aa0179f515faee2585b599172595d7a327f86f5d0e1840b00a802f93ec7d1f7f
                              • Instruction ID: e34c51c4655644d448891d6e012a687228a685227209f61e40b2a19255ab6935
                              • Opcode Fuzzy Hash: aa0179f515faee2585b599172595d7a327f86f5d0e1840b00a802f93ec7d1f7f
                              • Instruction Fuzzy Hash: A590023304C74C8F454027957C09555BB5C96495157804051A54D81613DAA5641445A5