Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GhwFStoMJX.exe

Overview

General Information

Sample name:GhwFStoMJX.exe
renamed because original name is a hash value
Original sample name:fd19e12aebfd870dcc7fe04359e6e7a53daeeb281c2dfc21f7740f8e65edd264.exe
Analysis ID:1587768
MD5:ed236267c78420804814d86de99b8850
SHA1:21bd6d19e5664158c3d4d77ca3a2b7889827d0d4
SHA256:fd19e12aebfd870dcc7fe04359e6e7a53daeeb281c2dfc21f7740f8e65edd264
Tags:exeuser-adrian__luca
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • GhwFStoMJX.exe (PID: 1680 cmdline: "C:\Users\user\Desktop\GhwFStoMJX.exe" MD5: ED236267C78420804814D86DE99B8850)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: GhwFStoMJX.exeAvira: detected
Source: GhwFStoMJX.exeVirustotal: Detection: 73%Perma Link
Source: GhwFStoMJX.exeReversingLabs: Detection: 65%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: GhwFStoMJX.exeJoe Sandbox ML: detected
Source: GhwFStoMJX.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: GhwFStoMJX.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 5.253.86.15 5.253.86.15
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: oshi.at
Source: GhwFStoMJX.exeString found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
Source: GhwFStoMJX.exeString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0
Source: GhwFStoMJX.exeString found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
Source: GhwFStoMJX.exeString found in binary or memory: http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
Source: GhwFStoMJX.exeString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
Source: GhwFStoMJX.exeString found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
Source: GhwFStoMJX.exeString found in binary or memory: http://ocsps.ssl.com0
Source: GhwFStoMJX.exeString found in binary or memory: http://ocsps.ssl.com0?
Source: GhwFStoMJX.exeString found in binary or memory: http://ocsps.ssl.com0_
Source: GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BA3000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C18000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C28000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C32000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oshi.at
Source: GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BA3000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C18000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C28000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C32000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oshi.atd
Source: GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: GhwFStoMJX.exeString found in binary or memory: http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
Source: GhwFStoMJX.exeString found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
Source: GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at
Source: GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/WtFH
Source: GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C38000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C20000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C18000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C28000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/WtFH4n
Source: GhwFStoMJX.exeString found in binary or memory: https://oshi.at/WtFHF
Source: GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/WtFHt
Source: GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C18000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C28000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C32000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.atD
Source: GhwFStoMJX.exeString found in binary or memory: https://www.ssl.com/repository0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50017
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50019
Source: unknownNetwork traffic detected: HTTP traffic on port 50009 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50011 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50017 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50015 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50010
Source: unknownNetwork traffic detected: HTTP traffic on port 50019 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50011
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50014
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50016
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50015
Source: unknownNetwork traffic detected: HTTP traffic on port 50022 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50028 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50003 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50028
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50009
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50008
Source: unknownNetwork traffic detected: HTTP traffic on port 50010 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50016 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50008 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50014 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50021
Source: unknownNetwork traffic detected: HTTP traffic on port 50020 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50020
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50022
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50003
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50025
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50027
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50004
Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50025 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50027 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50021 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50030 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50030
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess Stats: CPU usage > 49%
Source: GhwFStoMJX.exeStatic PE information: invalid certificate
Source: GhwFStoMJX.exe, 00000000.00000002.4694001906.0000000000E8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs GhwFStoMJX.exe
Source: GhwFStoMJX.exe, 00000000.00000000.2225932087.0000000000824000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamereff.exe8 vs GhwFStoMJX.exe
Source: GhwFStoMJX.exeBinary or memory string: OriginalFilenamereff.exe8 vs GhwFStoMJX.exe
Source: GhwFStoMJX.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\GhwFStoMJX.exeMutant created: NULL
Source: GhwFStoMJX.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: GhwFStoMJX.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\GhwFStoMJX.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: GhwFStoMJX.exeVirustotal: Detection: 73%
Source: GhwFStoMJX.exeReversingLabs: Detection: 65%
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: GhwFStoMJX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: GhwFStoMJX.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeMemory allocated: E60000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeMemory allocated: 2B20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeMemory allocated: 4B20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeWindow / User API: threadDelayed 2577Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeWindow / User API: threadDelayed 7261Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -25825441703193356s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -99870s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 6380Thread sleep count: 2577 > 30Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 6380Thread sleep count: 7261 > 30Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -99750s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -99640s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -99531s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -99422s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -99297s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -99187s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -99077s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -98968s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -98859s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -98747s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -98640s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -98521s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -98406s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -98297s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -98130s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -98012s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -97821s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -97707s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -97578s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -97468s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -97359s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -97250s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -97140s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -97031s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -96922s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -96797s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -96687s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -96578s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -96468s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -96359s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -96249s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -96140s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -96031s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -95922s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -95797s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -95679s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -95578s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -95435s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -95065s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -94937s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -94827s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -94718s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -94609s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -94500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -94389s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -94281s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -94172s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exe TID: 5476Thread sleep time: -94062s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 99870Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 99750Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 99640Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 99531Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 99422Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 99297Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 99187Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 99077Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 98968Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 98859Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 98747Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 98640Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 98521Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 98406Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 98297Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 98130Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 98012Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 97821Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 97707Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 97578Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 97468Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 97359Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 97250Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 97140Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 97031Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 96922Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 96797Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 96687Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 96578Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 96468Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 96359Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 96249Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 96140Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 96031Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 95922Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 95797Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 95679Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 95578Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 95435Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 95065Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 94937Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 94827Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 94718Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 94609Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 94500Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 94389Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 94281Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 94172Jump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeThread delayed: delay time: 94062Jump to behavior
Source: GhwFStoMJX.exe, 00000000.00000002.4694001906.0000000000EC1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\GhwFStoMJX.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeQueries volume information: C:\Users\user\Desktop\GhwFStoMJX.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\GhwFStoMJX.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
GhwFStoMJX.exe74%VirustotalBrowse
GhwFStoMJX.exe66%ReversingLabsWin32.Trojan.Leonem
GhwFStoMJX.exe100%AviraHEUR/AGEN.1362855
GhwFStoMJX.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://oshi.at/WtFH4n0%Avira URL Cloudsafe
https://oshi.at/WtFH0%Avira URL Cloudsafe
https://oshi.at/WtFHF0%Avira URL Cloudsafe
https://oshi.at/WtFHt0%Avira URL Cloudsafe
https://oshi.atD0%Avira URL Cloudsafe
http://ocsps.ssl.com0_0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
oshi.at
5.253.86.15
truefalse
    high
    fp2e7a.wpc.phicdn.net
    192.229.221.95
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0GhwFStoMJX.exefalse
        high
        https://oshi.at/WtFHFGhwFStoMJX.exefalse
        • Avira URL Cloud: safe
        unknown
        http://oshi.atdGhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BA3000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C18000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C28000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C32000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BDC000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://crls.ssl.com/ssl.com-rsa-RootCA.crl0GhwFStoMJX.exefalse
            high
            http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0GhwFStoMJX.exefalse
              high
              http://oshi.atGhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BA3000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C18000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C28000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C32000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BDC000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://oshi.at/WtFH4nGhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C38000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C20000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C18000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C28000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BDC000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.ssl.com/repository0GhwFStoMJX.exefalse
                  high
                  http://ocsps.ssl.com0?GhwFStoMJX.exefalse
                    high
                    http://ocsps.ssl.com0_GhwFStoMJX.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0GhwFStoMJX.exefalse
                      high
                      https://oshi.atGhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://oshi.at/WtFHGhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B21000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0QGhwFStoMJX.exefalse
                          high
                          http://ocsps.ssl.com0GhwFStoMJX.exefalse
                            high
                            http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0GhwFStoMJX.exefalse
                              high
                              http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0GhwFStoMJX.exefalse
                                high
                                https://oshi.at/WtFHtGhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B21000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://oshi.atDGhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C18000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C28000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002C32000.00000004.00000800.00020000.00000000.sdmp, GhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002BDC000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameGhwFStoMJX.exe, 00000000.00000002.4694598728.0000000002B87000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0GhwFStoMJX.exefalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    5.253.86.15
                                    oshi.atCyprus
                                    208046HOSTSLICK-GERMANYNLfalse
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1587768
                                    Start date and time:2025-01-10 17:51:06 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 50s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:6
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:GhwFStoMJX.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:fd19e12aebfd870dcc7fe04359e6e7a53daeeb281c2dfc21f7740f8e65edd264.exe
                                    Detection:MAL
                                    Classification:mal64.winEXE@1/0@1/1
                                    EGA Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 10
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.190.159.64, 13.107.246.45, 20.109.210.53, 40.126.32.134, 2.23.227.215
                                    • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, ocsps.ssl.com, slscr.update.microsoft.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target GhwFStoMJX.exe, PID 1680 because it is empty
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    TimeTypeDescription
                                    11:52:19API Interceptor11290512x Sleep call for process: GhwFStoMJX.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    5.253.86.15IMG_10503677.exeGet hashmaliciousUnknownBrowse
                                      Holiday#3021.exeGet hashmaliciousUnknownBrowse
                                        Holiday#3021.exeGet hashmaliciousUnknownBrowse
                                          Ref#103052.exeGet hashmaliciousUnknownBrowse
                                            Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
                                              Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                                                Ref_31020563.exeGet hashmaliciousUnknownBrowse
                                                  Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                                                    Ref#1550238.exeGet hashmaliciousUnknownBrowse
                                                      JuneOrder.exeGet hashmaliciousAsyncRAT, Babadeda, PureLog Stealer, zgRATBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        oshi.atIMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 194.15.112.248
                                                        IMG_10503677.exeGet hashmaliciousUnknownBrowse
                                                        • 5.253.86.15
                                                        Holiday#3021.exeGet hashmaliciousUnknownBrowse
                                                        • 5.253.86.15
                                                        Holiday#3021.exeGet hashmaliciousUnknownBrowse
                                                        • 5.253.86.15
                                                        Ref#103052.exeGet hashmaliciousXWormBrowse
                                                        • 194.15.112.248
                                                        Ref#103052.exeGet hashmaliciousUnknownBrowse
                                                        • 5.253.86.15
                                                        9876567899.bat.exeGet hashmaliciousLokibotBrowse
                                                        • 194.15.112.248
                                                        Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 5.253.86.15
                                                        Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 5.253.86.15
                                                        Ref_31020563.exeGet hashmaliciousUnknownBrowse
                                                        • 194.15.112.248
                                                        fp2e7a.wpc.phicdn.netAudioCodesAppSuite.exeGet hashmaliciousUnknownBrowse
                                                        • 192.229.221.95
                                                        launcher.exe.bin.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                                                        • 192.229.221.95
                                                        Shipping Document.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 192.229.221.95
                                                        https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                        • 192.229.221.95
                                                        1.pngGet hashmaliciousUnknownBrowse
                                                        • 192.229.221.95
                                                        atomxml.ps1Get hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                        • 192.229.221.95
                                                        TR98760H.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 192.229.221.95
                                                        Payment-Order #24560274 for 8,380 USD.exeGet hashmaliciousXWormBrowse
                                                        • 192.229.221.95
                                                        invoice-1623385214.pdf.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                        • 192.229.221.95
                                                        PO#3311-20250108003.xlsGet hashmaliciousUnknownBrowse
                                                        • 192.229.221.95
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        HOSTSLICK-GERMANYNLIMG_10503677.exeGet hashmaliciousUnknownBrowse
                                                        • 5.253.86.15
                                                        Holiday#3021.exeGet hashmaliciousUnknownBrowse
                                                        • 5.253.86.15
                                                        Holiday#3021.exeGet hashmaliciousUnknownBrowse
                                                        • 5.253.86.15
                                                        Ref#103052.exeGet hashmaliciousUnknownBrowse
                                                        • 5.253.86.15
                                                        Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 5.253.86.15
                                                        Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 5.253.86.15
                                                        Ref_31020563.exeGet hashmaliciousUnknownBrowse
                                                        • 5.253.86.15
                                                        Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 5.253.86.15
                                                        Ref#1550238.exeGet hashmaliciousUnknownBrowse
                                                        • 5.253.86.15
                                                        an_api.exeGet hashmaliciousUnknownBrowse
                                                        • 193.142.146.64
                                                        No context
                                                        No context
                                                        No created / dropped files found
                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):4.8419219498993815
                                                        TrID:
                                                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                        • Win32 Executable (generic) a (10002005/4) 49.97%
                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                        • DOS Executable Generic (2002/1) 0.01%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:GhwFStoMJX.exe
                                                        File size:31'712 bytes
                                                        MD5:ed236267c78420804814d86de99b8850
                                                        SHA1:21bd6d19e5664158c3d4d77ca3a2b7889827d0d4
                                                        SHA256:fd19e12aebfd870dcc7fe04359e6e7a53daeeb281c2dfc21f7740f8e65edd264
                                                        SHA512:7c28b89d1e7c4c429cc2528cc935839be61a5cb41c621ae48547c7cc64479df6a0254382eaab2fba52af3d4cbf261ccffdfc8d0d40043042bc6cb86f7be7af1a
                                                        SSDEEP:384:GSwPLqusAKYP/GKhwlJCXOxFm7bhCm/zH:xwz9HvK6XiFZKj
                                                        TLSH:00E22A424B3843A2D94F4A38E8D156F319BDDE845E4C569B2790FF0E5DB4B881BC71AC
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ig.....................J......r0... ...@....@.. ....................................`................................
                                                        Icon Hash:27d8dcd6d4d85007
                                                        Entrypoint:0x403072
                                                        Entrypoint Section:.text
                                                        Digitally signed:true
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x6769F7E0 [Mon Dec 23 23:53:04 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                        Signature Valid:false
                                                        Signature Issuer:CN=SSL.com EV Code Signing Intermediate CA RSA R3, O=SSL Corp, L=Houston, S=Texas, C=US
                                                        Signature Validation Error:The digital signature of the object did not verify
                                                        Error Number:-2146869232
                                                        Not Before, Not After
                                                        • 04/07/2024 06:35:32 15/05/2027 17:15:04
                                                        Subject Chain
                                                        • OID.1.3.6.1.4.1.311.60.2.1.3=VN, OID.2.5.4.15=Private Organization, CN="DUC FABULOUS CO.,LTD", SERIALNUMBER=0105838409, O="DUC FABULOUS CO.,LTD", L=Hanoi, C=VN
                                                        Version:3
                                                        Thumbprint MD5:FF0E889D2A73C3A679605952D35452DC
                                                        Thumbprint SHA-1:2C1D12F8BBE0827400A8440AF74FFFA8DCC8097C
                                                        Thumbprint SHA-256:A73352D67693AA16BCE2F182B15891F0F23EA0485CC18938686AAFDEE7B743E3
                                                        Serial:6DD2E3173995F51BFAC1D9FB4CB200C1
                                                        Instruction
                                                        jmp dword ptr [00402000h]
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x30280x4a.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x4656.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x5e000x1de0.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000x10780x12004d7035380253ed363ae6317dc8c576b6False0.5501302083333334data5.239235838942246IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rsrc0x40000x46560x480025fbfd232277978aeab9ab157c4dce6eFalse0.06179470486111111data2.4670696213657792IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xa0000xc0x20078220c57bae77f0280715bd915a05a2aFalse0.04296875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0x406c0x4028Device independent bitmap graphic, 64 x 128 x 32, image size 00.02368485143692158
                                                        RT_GROUP_ICON0x80d00x14data1.05
                                                        RT_VERSION0x81200x310data0.4477040816326531
                                                        RT_MANIFEST0x846c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                        DLLImport
                                                        mscoree.dll_CorExeMain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 10, 2025 17:52:20.070346117 CET49723443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:52:20.070400953 CET443497235.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:52:20.070466042 CET49723443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:52:20.082065105 CET49723443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:52:20.082086086 CET443497235.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:53:02.849649906 CET443497235.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:53:02.849723101 CET49723443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:02.858194113 CET49723443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:02.858215094 CET443497235.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:53:02.893270016 CET49985443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:02.893313885 CET443499855.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:53:02.893377066 CET49985443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:02.893804073 CET49985443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:02.893830061 CET443499855.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:53:45.679543972 CET443499855.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:53:45.679620028 CET49985443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:45.680588007 CET49985443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:45.680608988 CET443499855.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:53:45.687012911 CET50003443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:45.687056065 CET443500035.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:53:45.687119007 CET50003443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:45.687467098 CET50003443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:45.687475920 CET443500035.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:53:48.333292007 CET50003443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:48.370986938 CET50004443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:48.371042967 CET443500045.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:53:48.371229887 CET50004443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:48.371556044 CET50004443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:53:48.371567965 CET443500045.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:53:48.379326105 CET443500035.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:05.665436983 CET50004443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:05.667326927 CET50007443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:05.667361021 CET443500075.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:05.667433023 CET50007443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:05.667788982 CET50007443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:05.667805910 CET443500075.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:05.707334995 CET443500045.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:07.058886051 CET443500035.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:07.058943033 CET50003443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:08.463732004 CET50007443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:08.464509010 CET50008443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:08.464540958 CET443500085.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:08.464891911 CET50008443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:08.465253115 CET50008443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:08.465267897 CET443500085.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:08.507340908 CET443500075.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:09.746778965 CET443500045.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:09.751348972 CET50004443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:14.571690083 CET50008443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:14.575556993 CET50009443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:14.575599909 CET443500095.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:14.575756073 CET50009443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:14.579555988 CET50009443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:14.579574108 CET443500095.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:14.615331888 CET443500085.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:14.837251902 CET50009443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:14.839374065 CET50010443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:14.839407921 CET443500105.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:14.839474916 CET50010443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:14.839946032 CET50010443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:14.839956999 CET443500105.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:14.879349947 CET443500095.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:16.634335995 CET50010443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:16.635948896 CET50011443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:16.635993958 CET443500115.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:16.636123896 CET50011443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:16.638569117 CET50011443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:16.638583899 CET443500115.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:16.675332069 CET443500105.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:27.048095942 CET443500075.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:27.048180103 CET50007443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:29.863178968 CET443500085.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:29.863512039 CET50008443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:35.969764948 CET443500095.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:35.969851971 CET50009443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:36.215796947 CET443500105.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:36.215874910 CET50010443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:48.618557930 CET50011443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:48.618719101 CET443500115.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:48.618781090 CET50011443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:48.621290922 CET50014443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:48.621332884 CET443500145.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:48.623723030 CET50014443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:48.624093056 CET50014443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:48.624108076 CET443500145.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:52.431618929 CET50014443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:52.432598114 CET50015443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:52.432641029 CET443500155.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:52.432867050 CET50015443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:52.433648109 CET50015443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:52.433656931 CET443500155.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:52.475338936 CET443500145.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:54.805948973 CET50015443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:54.809576988 CET50016443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:54.809627056 CET443500165.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:54.809729099 CET50016443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:54.810049057 CET50016443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:54:54.810058117 CET443500165.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:54:54.847325087 CET443500155.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:01.134556055 CET50016443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:01.137113094 CET50017443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:01.137188911 CET443500175.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:01.137262106 CET50017443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:01.137739897 CET50017443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:01.137774944 CET443500175.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:01.175335884 CET443500165.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:10.014134884 CET443500145.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:10.014211893 CET50014443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:13.811965942 CET443500155.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:13.812028885 CET50015443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:16.216106892 CET443500165.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:16.219697952 CET50016443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:19.634109974 CET50017443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:19.636858940 CET50019443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:19.636926889 CET443500195.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:19.637011051 CET50019443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:19.637455940 CET50019443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:19.637489080 CET443500195.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:19.675338030 CET443500175.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:22.530844927 CET443500175.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:22.531035900 CET50017443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:24.041709900 CET50019443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:24.041713953 CET50020443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:24.041768074 CET443500205.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:24.043781996 CET50020443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:24.044001102 CET50020443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:24.044015884 CET443500205.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:24.083338976 CET443500195.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:31.301651001 CET50020443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:31.341279984 CET50021443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:31.341337919 CET443500215.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:31.341394901 CET50021443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:31.343076944 CET50021443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:31.343097925 CET443500215.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:31.343336105 CET443500205.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:41.269509077 CET443500195.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:41.269583941 CET50019443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:45.437840939 CET443500205.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:45.437911034 CET50020443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:48.243345976 CET50021443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:48.251574993 CET50022443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:48.251631021 CET443500225.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:48.255888939 CET50022443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:48.256304979 CET50022443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:48.256335974 CET443500225.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:48.287358999 CET443500215.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:52.721394062 CET443500215.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:52.721478939 CET50021443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:59.602747917 CET50022443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:59.604302883 CET50025443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:59.604351997 CET443500255.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:59.604412079 CET50025443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:59.604758978 CET50025443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:55:59.604770899 CET443500255.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:55:59.643332005 CET443500225.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:03.243391991 CET50025443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:03.245543003 CET50027443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:03.245587111 CET443500275.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:03.245666027 CET50027443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:03.246052027 CET50027443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:03.246066093 CET443500275.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:03.291330099 CET443500255.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:03.712042093 CET50027443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:03.713532925 CET50028443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:03.713571072 CET443500285.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:03.713694096 CET50028443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:03.714040041 CET50028443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:03.714056015 CET443500285.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:03.759332895 CET443500275.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:09.642457008 CET443500225.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:09.642800093 CET50022443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:20.969820023 CET443500255.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:20.969867945 CET50025443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:24.643955946 CET443500275.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:24.644062042 CET50027443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:26.794886112 CET50028443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:26.795033932 CET443500285.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:26.795145035 CET50028443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:26.796396017 CET50030443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:26.796427011 CET443500305.253.86.15192.168.2.5
                                                        Jan 10, 2025 17:56:26.796546936 CET50030443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:26.797000885 CET50030443192.168.2.55.253.86.15
                                                        Jan 10, 2025 17:56:26.797010899 CET443500305.253.86.15192.168.2.5
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 10, 2025 17:52:20.018769026 CET5798353192.168.2.51.1.1.1
                                                        Jan 10, 2025 17:52:20.043090105 CET53579831.1.1.1192.168.2.5
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Jan 10, 2025 17:52:20.018769026 CET192.168.2.51.1.1.10x51c3Standard query (0)oshi.atA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Jan 10, 2025 17:52:17.829133987 CET1.1.1.1192.168.2.50xbcd5No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                        Jan 10, 2025 17:52:17.829133987 CET1.1.1.1192.168.2.50xbcd5No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 17:52:20.043090105 CET1.1.1.1192.168.2.50x51c3No error (0)oshi.at5.253.86.15A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 17:52:20.043090105 CET1.1.1.1192.168.2.50x51c3No error (0)oshi.at194.15.112.248A (IP address)IN (0x0001)false

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Target ID:0
                                                        Start time:11:52:19
                                                        Start date:10/01/2025
                                                        Path:C:\Users\user\Desktop\GhwFStoMJX.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\GhwFStoMJX.exe"
                                                        Imagebase:0x820000
                                                        File size:31'712 bytes
                                                        MD5 hash:ED236267C78420804814D86DE99B8850
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:false

                                                        Reset < >
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4693942475.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e60000_GhwFStoMJX.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Te]q
                                                          • API String ID: 0-52440209
                                                          • Opcode ID: 0827932462e3a388ce328114c3951651c1aad07f16c0f11699ed9f989e242352
                                                          • Instruction ID: a3eed464e953f10033de25c425f0b8dd056fc8dfdf9864978fe2818518f75c88
                                                          • Opcode Fuzzy Hash: 0827932462e3a388ce328114c3951651c1aad07f16c0f11699ed9f989e242352
                                                          • Instruction Fuzzy Hash: 5F016D30A84325CFCB589F68A0546FF7AB2AB493C8F34A869C003BB350CB704D45EB91
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4693942475.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e60000_GhwFStoMJX.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: pN
                                                          • API String ID: 0-805884423
                                                          • Opcode ID: 1d72c283be42632ea9b958794030ff62a2c71a37ba66afa85def73b0e9908fe2
                                                          • Instruction ID: 5ab35c8993370f9f72483cbdcdc685a35e9b7cc3931b25543dbab0359973b398
                                                          • Opcode Fuzzy Hash: 1d72c283be42632ea9b958794030ff62a2c71a37ba66afa85def73b0e9908fe2
                                                          • Instruction Fuzzy Hash: 50E0E5B4D50208EFCB44EFB8F94159DBBF5EB48340F2095AAD809B7350E6306B449B90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4693942475.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e60000_GhwFStoMJX.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5fc0be59079ca0fa152699c0d5852aed41d6f4e14de208d494ae1d7b3c3cce48
                                                          • Instruction ID: a202378176322ec6908fce8b5499bcc28580dfa7d51eedcf6d3e0dc3acd3aafc
                                                          • Opcode Fuzzy Hash: 5fc0be59079ca0fa152699c0d5852aed41d6f4e14de208d494ae1d7b3c3cce48
                                                          • Instruction Fuzzy Hash: 7F21F430789365CFC72697A5B8104BF7FA69EC23D4314A5ABD00AFB252EA148D04C351
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4693942475.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e60000_GhwFStoMJX.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 355a6661dbd4a34a326dc3117ef033dbe75dc55782c2eeb9b690907bfb260639
                                                          • Instruction ID: 78bd4809aa5c72a085f628cb32b2924977d5914c3ef775c1a658bf79c6d2c562
                                                          • Opcode Fuzzy Hash: 355a6661dbd4a34a326dc3117ef033dbe75dc55782c2eeb9b690907bfb260639
                                                          • Instruction Fuzzy Hash: 523126B1D002489FCB14CFAAD580ADEFFF5AF48344F248069E919BB250DB749945CFA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4693942475.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e60000_GhwFStoMJX.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6c520d434ab81875ea48179d8389861d1f4b00d3bbd04e32e124eca30fc65830
                                                          • Instruction ID: 35f15d3e2e4518c467ba281470c46d9b946b10019299ca01914a356b8b93c6ab
                                                          • Opcode Fuzzy Hash: 6c520d434ab81875ea48179d8389861d1f4b00d3bbd04e32e124eca30fc65830
                                                          • Instruction Fuzzy Hash: 45116130A84325CFDB559F74E0146FE7BB1AB49398F34A869C003BB251CBB54C46DB51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4693942475.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e60000_GhwFStoMJX.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f8ce74e41d653b113fa648e9329eb2061c394e3b0cdc9aab4bd7a8542002292c
                                                          • Instruction ID: a19eea4fcfd53920b56a74cb7adfdd76a3a9f6a9b89163cf047cab40568d6c91
                                                          • Opcode Fuzzy Hash: f8ce74e41d653b113fa648e9329eb2061c394e3b0cdc9aab4bd7a8542002292c
                                                          • Instruction Fuzzy Hash: 4501F7322802245FC22AEB29F4105BF36AAAFC43943119929D01AABB45FE28DD0687D1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4693807455.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e0d000_GhwFStoMJX.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e43b7e905b26b28acffb9d6e04eca7ada23bb81d9d21e599c4d9e8b8376c747c
                                                          • Instruction ID: 5690fe64f13294801f6a404313379a6b12ad8888dcb5cb4683f6be7dc793f33b
                                                          • Opcode Fuzzy Hash: e43b7e905b26b28acffb9d6e04eca7ada23bb81d9d21e599c4d9e8b8376c747c
                                                          • Instruction Fuzzy Hash: 3501A7311083449AD7208A55DD84B66FFD8EF45724F1CD42BED491A2C6C2799884CB75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4693942475.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e60000_GhwFStoMJX.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4a33143ed6862360d02321769ab290e740314d4b12ae6c652ed3e63a9d3d444c
                                                          • Instruction ID: 617023ec18d04f91b09b66146bc2db39f6e191a30052ab12830370ffdb339de4
                                                          • Opcode Fuzzy Hash: 4a33143ed6862360d02321769ab290e740314d4b12ae6c652ed3e63a9d3d444c
                                                          • Instruction Fuzzy Hash: EFF028313C01244F822AA729F4104BF32DBBFC43943205939C41EAB704EE28DD0687D1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4693807455.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e0d000_GhwFStoMJX.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bdc46e443bcec2402836785fc02bcb792a4562745aa62a6d390b00cbc9cbb49f
                                                          • Instruction ID: 693e8782ca301c463f30566629db217a8d87242a8e550dea77d2c6cb3ba6b5d6
                                                          • Opcode Fuzzy Hash: bdc46e443bcec2402836785fc02bcb792a4562745aa62a6d390b00cbc9cbb49f
                                                          • Instruction Fuzzy Hash: 2BF062714083449EE7208A16DC84B66FFA8EF56725F18C45AFD485A2C6C2799C44CBB5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4693942475.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e60000_GhwFStoMJX.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 54ea0770bb98b87bb2f0b2bc14f8395e694747c619ba38050d1bc2db55cd6752
                                                          • Instruction ID: 3580f71dccd6d769990be44d86081cf37ec19c13d61a4d203ca8cf4fe2f8f63d
                                                          • Opcode Fuzzy Hash: 54ea0770bb98b87bb2f0b2bc14f8395e694747c619ba38050d1bc2db55cd6752
                                                          • Instruction Fuzzy Hash: DBD022317000108BCA4D2BF8001722C21F74BC63407A18018E003EF3C1EE63DD810347