Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
oe8KMVNFEG.exe

Overview

General Information

Sample name:oe8KMVNFEG.exe
renamed because original name is a hash value
Original sample name:d64cdbe6ba08bc293e824dc87c3b0aca90e432514f18b189b5f37e59bfaa29b9.exe
Analysis ID:1588612
MD5:e10abad4b0666e5acf257e4603453975
SHA1:c5b02e62e6ad90541778f1b34ee9fc02f8e8d9b9
SHA256:d64cdbe6ba08bc293e824dc87c3b0aca90e432514f18b189b5f37e59bfaa29b9
Tags:exeuser-adrian__luca
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • oe8KMVNFEG.exe (PID: 7552 cmdline: "C:\Users\user\Desktop\oe8KMVNFEG.exe" MD5: E10ABAD4B0666E5ACF257E4603453975)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: oe8KMVNFEG.exeAvira: detected
Source: oe8KMVNFEG.exeVirustotal: Detection: 63%Perma Link
Source: oe8KMVNFEG.exeReversingLabs: Detection: 60%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: oe8KMVNFEG.exeJoe Sandbox ML: detected
Source: oe8KMVNFEG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: oe8KMVNFEG.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 45.9.191.182 45.9.191.182
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: xianggrhen.com
Source: oe8KMVNFEG.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: oe8KMVNFEG.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: oe8KMVNFEG.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: oe8KMVNFEG.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: oe8KMVNFEG.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: oe8KMVNFEG.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: oe8KMVNFEG.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: oe8KMVNFEG.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: oe8KMVNFEG.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: oe8KMVNFEG.exeString found in binary or memory: http://ocsp.digicert.com0
Source: oe8KMVNFEG.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: oe8KMVNFEG.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: oe8KMVNFEG.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: oe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003169000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: oe8KMVNFEG.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031AA000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000319B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com
Source: oe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003111000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003109000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000030F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com/salad/Ekaopt.mp4
Source: oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031F8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000320E000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003169000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031EC000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com/salad/Ekaopt.mp4l
Source: oe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003181000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031F8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000320E000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003169000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031EC000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.comD
Source: oe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003181000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031F8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000320C000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000320E000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031E9000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003169000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031EC000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031AA000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000319B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.comd
Source: oe8KMVNFEG.exeString found in binary or memory: https://www.paessler.com0
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_0170E5F40_2_0170E5F4
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_0170F4F80_2_0170F4F8
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_0170F4E80_2_0170F4E8
Source: oe8KMVNFEG.exeStatic PE information: invalid certificate
Source: oe8KMVNFEG.exe, 00000000.00000002.4209141171.00000000012AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs oe8KMVNFEG.exe
Source: oe8KMVNFEG.exe, 00000000.00000000.1756232477.0000000000CFA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEzwjwazt.exe vs oe8KMVNFEG.exe
Source: oe8KMVNFEG.exeBinary or memory string: OriginalFilenameEzwjwazt.exe vs oe8KMVNFEG.exe
Source: oe8KMVNFEG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeMutant created: NULL
Source: oe8KMVNFEG.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: oe8KMVNFEG.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: oe8KMVNFEG.exeVirustotal: Detection: 63%
Source: oe8KMVNFEG.exeReversingLabs: Detection: 60%
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
Source: oe8KMVNFEG.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: oe8KMVNFEG.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_0170EFC0 pushfd ; retf 0_2_0170EFC1
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeMemory allocated: 16C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeMemory allocated: 30A0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeMemory allocated: 2ED0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeWindow / User API: threadDelayed 2628Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeWindow / User API: threadDelayed 7187Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep count: 37 > 30Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -34126476536362649s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7624Thread sleep count: 2628 > 30Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7624Thread sleep count: 7187 > 30Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -99875s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -99766s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -99657s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -99532s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -99407s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -99282s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -99157s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -99032s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -98922s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -98813s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -98688s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -98563s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -98438s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -98313s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -98185s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -98078s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -97871s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -97759s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -97653s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -97515s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -97407s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -97293s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -97188s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -97078s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -96969s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -96860s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -96735s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -96610s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -96485s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -96360s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -96235s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -96110s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -95985s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -95860s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -95735s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -95610s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -95485s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -95360s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -95235s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -95108s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -95000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -94856s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -94746s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -94641s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -94516s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -94406s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -94297s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7592Thread sleep time: -94185s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 99875Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 99766Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 99657Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 99532Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 99407Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 99282Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 99157Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 99032Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 98922Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 98813Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 98688Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 98563Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 98438Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 98313Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 98185Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 98078Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 97871Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 97759Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 97653Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 97515Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 97407Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 97293Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 97188Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 97078Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 96969Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 96860Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 96735Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 96610Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 96485Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 96360Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 96235Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 96110Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 95985Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 95860Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 95735Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 95610Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 95485Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 95360Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 95235Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 95108Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 95000Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 94856Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 94746Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 94641Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 94516Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 94406Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 94297Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 94185Jump to behavior
Source: oe8KMVNFEG.exe, 00000000.00000002.4210874987.00000000057F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllx
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeQueries volume information: C:\Users\user\Desktop\oe8KMVNFEG.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
oe8KMVNFEG.exe64%VirustotalBrowse
oe8KMVNFEG.exe61%ReversingLabsWin32.Trojan.Jalapeno
oe8KMVNFEG.exe100%AviraHEUR/AGEN.1304477
oe8KMVNFEG.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://xianggrhen.com/salad/Ekaopt.mp40%Avira URL Cloudsafe
http://xianggrhen.com/salad/Ekaopt.mp4l0%Avira URL Cloudsafe
http://xianggrhen.comD0%Avira URL Cloudsafe
https://www.paessler.com00%Avira URL Cloudsafe
http://xianggrhen.com0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
xianggrhen.com
45.9.191.182
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://xianggrhen.com/salad/Ekaopt.mp4false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://xianggrhen.comoe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031AA000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000319B000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameoe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003169000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://xianggrhen.com/salad/Ekaopt.mp4loe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031F8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000320E000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003169000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031EC000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031A6000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xianggrhen.comDoe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003181000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031F8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000320E000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003169000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031EC000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031AA000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xianggrhen.comdoe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003181000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031F8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000320C000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000320E000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031E9000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.0000000003169000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031EC000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.00000000031AA000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.4209662983.000000000319B000.00000004.00000800.00020000.00000000.sdmpfalse
        unknown
        https://www.paessler.com0oe8KMVNFEG.exefalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        45.9.191.182
        xianggrhen.comGermany
        47583AS-HOSTINGERLTfalse
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1588612
        Start date and time:2025-01-11 03:08:11 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 41s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:oe8KMVNFEG.exe
        renamed because original name is a hash value
        Original Sample Name:d64cdbe6ba08bc293e824dc87c3b0aca90e432514f18b189b5f37e59bfaa29b9.exe
        Detection:MAL
        Classification:mal64.winEXE@1/0@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 98%
        • Number of executed functions: 10
        • Number of non-executed functions: 3
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240000 for current running targets taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        TimeTypeDescription
        21:09:11API Interceptor11457497x Sleep call for process: oe8KMVNFEG.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        45.9.191.182PqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/basket/Snobzw.vdf
        PqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/basket/Snobzw.vdf
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/book/Fvrbzpfzrm.vdf
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/book/Fvrbzpfzrm.vdf
        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/book/Netnoyfq.mp3
        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/composure/Emmaj.vdf
        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/composure/Vuglyxyuvio.pdf
        MN-PAYMENT20241206-5002-10259-410291-30198-281920-30183-21474.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/camp/Reibbfkkyy.dat
        DecPayment410_F2103_S29103_M839_U4721_S381I_S98EEU_USD031224.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/desk/Tbddfcris.vdf
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        xianggrhen.comPqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        PqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        MN-PAYMENT20241206-5002-10259-410291-30198-281920-30183-21474.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        DecPayment410_F2103_S29103_M839_U4721_S381I_S98EEU_USD031224.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        AMTR-TT4781-SWFT-U4Y81-SO39-C37AR-AO937-CNR742-S3782-2818DY-9A82.exeGet hashmaliciousUnknownBrowse
        • 92.113.29.113
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AS-HOSTINGERLTPqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        PqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
        • 92.249.45.121
        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
        • 92.249.45.121
        MN-PAYMENT20241206-5002-10259-410291-30198-281920-30183-21474.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        No context
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):5.717986822258666
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
        • Win32 Executable (generic) a (10002005/4) 49.97%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:oe8KMVNFEG.exe
        File size:355'824 bytes
        MD5:e10abad4b0666e5acf257e4603453975
        SHA1:c5b02e62e6ad90541778f1b34ee9fc02f8e8d9b9
        SHA256:d64cdbe6ba08bc293e824dc87c3b0aca90e432514f18b189b5f37e59bfaa29b9
        SHA512:845f21d7e482cc5bdf226837e066b44db9a968cc20b5d36862ac2658c94ed7de11eca4163d8b324bd1dda8d0626cebf0b31316c97bf6901d6fe82117bc6b930a
        SSDEEP:6144:5PfmPMXk/cCRLxPJ2aQtr7beeozoI9QAjK0N:5TXk0C9eRwvn
        TLSH:BD74C3F4DFF4C024C68861F5E01D4624D2E0A9A9DF728E06AAA753AC15A27DCDDCC1E7
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Og.................j............... ........@.. ....................................`................................
        Icon Hash:1838d371e870710e
        Entrypoint:0x4288ce
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x674FE587 [Wed Dec 4 05:15:51 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Signature Valid:false
        Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
        Signature Validation Error:The digital signature of the object did not verify
        Error Number:-2146869232
        Not Before, Not After
        • 10/02/2022 00:00:00 12/02/2025 23:59:59
        Subject Chain
        • CN=Paessler AG, O=Paessler AG, L=N\xfcrnberg, C=DE
        Version:3
        Thumbprint MD5:234FA1A9133E1A346EA15776D9F6CCDF
        Thumbprint SHA-1:67F655F2440F1D2C453963909848E352D0EA89B2
        Thumbprint SHA-256:977E514E290BF4040604678E5E6615183CB8B77EC24D3A59B3C6794DD03CBC8E
        Serial:0CB1CD6F7F1F8923E738064FB0E9FECA
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x288800x4b.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2a0000x2d200.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x540000x2df0.rsrc
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x580000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x268d40x26a00bac9665143180cc6fff9248b01f10d3bFalse0.43673518406148865data6.045797265471035IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x2a0000x2d2000x2d200903029ae5522937eeeccf4d8202b8d14False0.24765192174515235data4.541245382679845IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x580000xc0x2007b8c32915a3a4ddef936e6c3fdb68033False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x2a2b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 11811 x 11811 px/m0.549645390070922
        RT_ICON0x2a7180x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 11811 x 11811 px/m0.39549180327868855
        RT_ICON0x2b0a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 11811 x 11811 px/m0.32082551594746717
        RT_ICON0x2c1480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 11811 x 11811 px/m0.23443983402489627
        RT_ICON0x2e6f00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 11811 x 11811 px/m0.19845299952763346
        RT_ICON0x329180x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 11811 x 11811 px/m0.17841959334565619
        RT_ICON0x37da00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 11811 x 11811 px/m0.14746689089762455
        RT_ICON0x412480x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 11811 x 11811 px/m0.1194398438424228
        RT_ICON0x51a700x4dc9PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.99598252397931
        RT_GROUP_ICON0x5683c0x84data0.7272727272727273
        RT_VERSION0x568c00x5a8data0.30455801104972374
        RT_MANIFEST0x56e680x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        DLLImport
        mscoree.dll_CorExeMain
        TimestampSource PortDest PortSource IPDest IP
        Jan 11, 2025 03:09:12.760500908 CET4973180192.168.2.445.9.191.182
        Jan 11, 2025 03:09:12.765367031 CET804973145.9.191.182192.168.2.4
        Jan 11, 2025 03:09:12.765440941 CET4973180192.168.2.445.9.191.182
        Jan 11, 2025 03:09:12.766546965 CET4973180192.168.2.445.9.191.182
        Jan 11, 2025 03:09:12.771511078 CET804973145.9.191.182192.168.2.4
        Jan 11, 2025 03:09:34.139872074 CET804973145.9.191.182192.168.2.4
        Jan 11, 2025 03:09:34.140137911 CET4973180192.168.2.445.9.191.182
        Jan 11, 2025 03:09:34.161673069 CET4973180192.168.2.445.9.191.182
        Jan 11, 2025 03:09:34.163491011 CET4973880192.168.2.445.9.191.182
        Jan 11, 2025 03:09:34.166471958 CET804973145.9.191.182192.168.2.4
        Jan 11, 2025 03:09:34.168317080 CET804973845.9.191.182192.168.2.4
        Jan 11, 2025 03:09:34.168435097 CET4973880192.168.2.445.9.191.182
        Jan 11, 2025 03:09:34.168575048 CET4973880192.168.2.445.9.191.182
        Jan 11, 2025 03:09:34.173362017 CET804973845.9.191.182192.168.2.4
        Jan 11, 2025 03:09:55.549710989 CET804973845.9.191.182192.168.2.4
        Jan 11, 2025 03:09:55.549921036 CET4973880192.168.2.445.9.191.182
        Jan 11, 2025 03:09:55.550888062 CET4973880192.168.2.445.9.191.182
        Jan 11, 2025 03:09:55.556344032 CET804973845.9.191.182192.168.2.4
        Jan 11, 2025 03:09:55.559189081 CET4973980192.168.2.445.9.191.182
        Jan 11, 2025 03:09:55.564961910 CET804973945.9.191.182192.168.2.4
        Jan 11, 2025 03:09:55.565047979 CET4973980192.168.2.445.9.191.182
        Jan 11, 2025 03:09:55.565181971 CET4973980192.168.2.445.9.191.182
        Jan 11, 2025 03:09:55.570925951 CET804973945.9.191.182192.168.2.4
        Jan 11, 2025 03:10:16.921251059 CET804973945.9.191.182192.168.2.4
        Jan 11, 2025 03:10:16.921310902 CET4973980192.168.2.445.9.191.182
        Jan 11, 2025 03:10:16.921782970 CET4973980192.168.2.445.9.191.182
        Jan 11, 2025 03:10:16.922642946 CET4983180192.168.2.445.9.191.182
        Jan 11, 2025 03:10:16.926645994 CET804973945.9.191.182192.168.2.4
        Jan 11, 2025 03:10:16.927552938 CET804983145.9.191.182192.168.2.4
        Jan 11, 2025 03:10:16.927633047 CET4983180192.168.2.445.9.191.182
        Jan 11, 2025 03:10:16.927743912 CET4983180192.168.2.445.9.191.182
        Jan 11, 2025 03:10:16.932527065 CET804983145.9.191.182192.168.2.4
        Jan 11, 2025 03:10:38.280908108 CET804983145.9.191.182192.168.2.4
        Jan 11, 2025 03:10:38.282907009 CET4983180192.168.2.445.9.191.182
        Jan 11, 2025 03:10:38.287053108 CET4983180192.168.2.445.9.191.182
        Jan 11, 2025 03:10:38.292639971 CET4995980192.168.2.445.9.191.182
        Jan 11, 2025 03:10:38.294681072 CET804983145.9.191.182192.168.2.4
        Jan 11, 2025 03:10:38.301414967 CET804995945.9.191.182192.168.2.4
        Jan 11, 2025 03:10:38.301500082 CET4995980192.168.2.445.9.191.182
        Jan 11, 2025 03:10:38.301742077 CET4995980192.168.2.445.9.191.182
        Jan 11, 2025 03:10:38.309351921 CET804995945.9.191.182192.168.2.4
        Jan 11, 2025 03:10:45.286396980 CET4995980192.168.2.445.9.191.182
        Jan 11, 2025 03:10:45.287838936 CET5000880192.168.2.445.9.191.182
        Jan 11, 2025 03:10:45.292673111 CET805000845.9.191.182192.168.2.4
        Jan 11, 2025 03:10:45.292733908 CET5000880192.168.2.445.9.191.182
        Jan 11, 2025 03:10:45.292859077 CET5000880192.168.2.445.9.191.182
        Jan 11, 2025 03:10:45.297564983 CET805000845.9.191.182192.168.2.4
        Jan 11, 2025 03:10:45.336680889 CET804995945.9.191.182192.168.2.4
        Jan 11, 2025 03:10:55.585144043 CET5000880192.168.2.445.9.191.182
        Jan 11, 2025 03:10:55.585148096 CET5000980192.168.2.445.9.191.182
        Jan 11, 2025 03:10:55.589986086 CET805000945.9.191.182192.168.2.4
        Jan 11, 2025 03:10:55.590143919 CET5000980192.168.2.445.9.191.182
        Jan 11, 2025 03:10:55.590342045 CET5000980192.168.2.445.9.191.182
        Jan 11, 2025 03:10:55.595127106 CET805000945.9.191.182192.168.2.4
        Jan 11, 2025 03:10:55.632700920 CET805000845.9.191.182192.168.2.4
        Jan 11, 2025 03:10:59.678078890 CET804995945.9.191.182192.168.2.4
        Jan 11, 2025 03:10:59.678261995 CET4995980192.168.2.445.9.191.182
        Jan 11, 2025 03:11:06.656702042 CET805000845.9.191.182192.168.2.4
        Jan 11, 2025 03:11:06.656829119 CET5000880192.168.2.445.9.191.182
        Jan 11, 2025 03:11:09.880110025 CET5000980192.168.2.445.9.191.182
        Jan 11, 2025 03:11:09.881953955 CET5001080192.168.2.445.9.191.182
        Jan 11, 2025 03:11:09.886883020 CET805001045.9.191.182192.168.2.4
        Jan 11, 2025 03:11:09.886943102 CET5001080192.168.2.445.9.191.182
        Jan 11, 2025 03:11:09.887082100 CET5001080192.168.2.445.9.191.182
        Jan 11, 2025 03:11:09.891904116 CET805001045.9.191.182192.168.2.4
        Jan 11, 2025 03:11:09.928673983 CET805000945.9.191.182192.168.2.4
        Jan 11, 2025 03:11:16.364506006 CET5001080192.168.2.445.9.191.182
        Jan 11, 2025 03:11:16.366892099 CET5001180192.168.2.445.9.191.182
        Jan 11, 2025 03:11:16.371843100 CET805001145.9.191.182192.168.2.4
        Jan 11, 2025 03:11:16.371923923 CET5001180192.168.2.445.9.191.182
        Jan 11, 2025 03:11:16.372122049 CET5001180192.168.2.445.9.191.182
        Jan 11, 2025 03:11:16.376900911 CET805001145.9.191.182192.168.2.4
        Jan 11, 2025 03:11:16.412693024 CET805001045.9.191.182192.168.2.4
        Jan 11, 2025 03:11:16.801984072 CET5001180192.168.2.445.9.191.182
        Jan 11, 2025 03:11:16.804195881 CET5001280192.168.2.445.9.191.182
        Jan 11, 2025 03:11:17.004396915 CET805000945.9.191.182192.168.2.4
        Jan 11, 2025 03:11:17.004471064 CET805001245.9.191.182192.168.2.4
        Jan 11, 2025 03:11:17.004539967 CET5000980192.168.2.445.9.191.182
        Jan 11, 2025 03:11:17.004632950 CET5001280192.168.2.445.9.191.182
        Jan 11, 2025 03:11:17.004757881 CET5001280192.168.2.445.9.191.182
        Jan 11, 2025 03:11:17.011944056 CET805001245.9.191.182192.168.2.4
        Jan 11, 2025 03:11:17.049673080 CET805001145.9.191.182192.168.2.4
        Jan 11, 2025 03:11:31.265983105 CET805001045.9.191.182192.168.2.4
        Jan 11, 2025 03:11:31.266202927 CET5001080192.168.2.445.9.191.182
        Jan 11, 2025 03:11:37.765846014 CET805001145.9.191.182192.168.2.4
        Jan 11, 2025 03:11:37.768397093 CET5001180192.168.2.445.9.191.182
        Jan 11, 2025 03:11:38.391536951 CET805001245.9.191.182192.168.2.4
        Jan 11, 2025 03:11:38.391613007 CET5001280192.168.2.445.9.191.182
        Jan 11, 2025 03:11:38.395862103 CET5001280192.168.2.445.9.191.182
        Jan 11, 2025 03:11:38.398005962 CET5001380192.168.2.445.9.191.182
        Jan 11, 2025 03:11:38.400733948 CET805001245.9.191.182192.168.2.4
        Jan 11, 2025 03:11:38.402837038 CET805001345.9.191.182192.168.2.4
        Jan 11, 2025 03:11:38.402909040 CET5001380192.168.2.445.9.191.182
        Jan 11, 2025 03:11:38.403243065 CET5001380192.168.2.445.9.191.182
        Jan 11, 2025 03:11:38.408087969 CET805001345.9.191.182192.168.2.4
        Jan 11, 2025 03:11:40.302088022 CET5001380192.168.2.445.9.191.182
        Jan 11, 2025 03:11:40.305185080 CET5001480192.168.2.445.9.191.182
        Jan 11, 2025 03:11:40.310127974 CET805001445.9.191.182192.168.2.4
        Jan 11, 2025 03:11:40.310194016 CET5001480192.168.2.445.9.191.182
        Jan 11, 2025 03:11:40.310342073 CET5001480192.168.2.445.9.191.182
        Jan 11, 2025 03:11:40.315115929 CET805001445.9.191.182192.168.2.4
        Jan 11, 2025 03:11:40.350725889 CET805001345.9.191.182192.168.2.4
        Jan 11, 2025 03:11:44.442779064 CET5001480192.168.2.445.9.191.182
        Jan 11, 2025 03:11:44.444395065 CET5001580192.168.2.445.9.191.182
        Jan 11, 2025 03:11:44.449253082 CET805001545.9.191.182192.168.2.4
        Jan 11, 2025 03:11:44.449317932 CET5001580192.168.2.445.9.191.182
        Jan 11, 2025 03:11:44.449440002 CET5001580192.168.2.445.9.191.182
        Jan 11, 2025 03:11:44.454262018 CET805001545.9.191.182192.168.2.4
        Jan 11, 2025 03:11:44.488692999 CET805001445.9.191.182192.168.2.4
        Jan 11, 2025 03:11:59.766926050 CET805001345.9.191.182192.168.2.4
        Jan 11, 2025 03:11:59.768341064 CET5001380192.168.2.445.9.191.182
        Jan 11, 2025 03:12:01.720885038 CET805001445.9.191.182192.168.2.4
        Jan 11, 2025 03:12:01.721487045 CET5001480192.168.2.445.9.191.182
        Jan 11, 2025 03:12:05.692715883 CET5001580192.168.2.445.9.191.182
        Jan 11, 2025 03:12:05.695847034 CET5001680192.168.2.445.9.191.182
        Jan 11, 2025 03:12:05.700742960 CET805001645.9.191.182192.168.2.4
        Jan 11, 2025 03:12:05.700891972 CET5001680192.168.2.445.9.191.182
        Jan 11, 2025 03:12:05.701138020 CET5001680192.168.2.445.9.191.182
        Jan 11, 2025 03:12:05.705918074 CET805001645.9.191.182192.168.2.4
        Jan 11, 2025 03:12:05.740811110 CET805001545.9.191.182192.168.2.4
        Jan 11, 2025 03:12:05.864702940 CET805001545.9.191.182192.168.2.4
        Jan 11, 2025 03:12:05.864794970 CET5001580192.168.2.445.9.191.182
        Jan 11, 2025 03:12:27.063750982 CET805001645.9.191.182192.168.2.4
        Jan 11, 2025 03:12:27.064086914 CET5001680192.168.2.445.9.191.182
        Jan 11, 2025 03:12:27.069930077 CET5001680192.168.2.445.9.191.182
        Jan 11, 2025 03:12:27.070065975 CET5001780192.168.2.445.9.191.182
        Jan 11, 2025 03:12:27.074659109 CET805001645.9.191.182192.168.2.4
        Jan 11, 2025 03:12:27.074892044 CET805001745.9.191.182192.168.2.4
        Jan 11, 2025 03:12:27.075030088 CET5001780192.168.2.445.9.191.182
        Jan 11, 2025 03:12:27.076484919 CET5001780192.168.2.445.9.191.182
        Jan 11, 2025 03:12:27.081224918 CET805001745.9.191.182192.168.2.4
        Jan 11, 2025 03:12:33.567909956 CET5001780192.168.2.445.9.191.182
        Jan 11, 2025 03:12:33.571014881 CET5001880192.168.2.445.9.191.182
        Jan 11, 2025 03:12:33.575879097 CET805001845.9.191.182192.168.2.4
        Jan 11, 2025 03:12:33.576036930 CET5001880192.168.2.445.9.191.182
        Jan 11, 2025 03:12:33.576138020 CET5001880192.168.2.445.9.191.182
        Jan 11, 2025 03:12:33.581005096 CET805001845.9.191.182192.168.2.4
        Jan 11, 2025 03:12:33.612749100 CET805001745.9.191.182192.168.2.4
        Jan 11, 2025 03:12:34.852284908 CET5001880192.168.2.445.9.191.182
        Jan 11, 2025 03:12:34.852375031 CET5001980192.168.2.445.9.191.182
        Jan 11, 2025 03:12:34.857182980 CET805001945.9.191.182192.168.2.4
        Jan 11, 2025 03:12:34.857301950 CET5001980192.168.2.445.9.191.182
        Jan 11, 2025 03:12:34.857395887 CET5001980192.168.2.445.9.191.182
        Jan 11, 2025 03:12:34.862195015 CET805001945.9.191.182192.168.2.4
        Jan 11, 2025 03:12:34.900850058 CET805001845.9.191.182192.168.2.4
        Jan 11, 2025 03:12:46.427181005 CET5001980192.168.2.445.9.191.182
        Jan 11, 2025 03:12:46.428931952 CET5002080192.168.2.445.9.191.182
        Jan 11, 2025 03:12:46.433878899 CET805002045.9.191.182192.168.2.4
        Jan 11, 2025 03:12:46.433991909 CET5002080192.168.2.445.9.191.182
        Jan 11, 2025 03:12:46.434233904 CET5002080192.168.2.445.9.191.182
        Jan 11, 2025 03:12:46.439080954 CET805002045.9.191.182192.168.2.4
        Jan 11, 2025 03:12:46.476959944 CET805001945.9.191.182192.168.2.4
        Jan 11, 2025 03:12:48.272344112 CET5002080192.168.2.445.9.191.182
        Jan 11, 2025 03:12:48.274605036 CET5002180192.168.2.445.9.191.182
        Jan 11, 2025 03:12:48.279510021 CET805002145.9.191.182192.168.2.4
        Jan 11, 2025 03:12:48.279620886 CET5002180192.168.2.445.9.191.182
        Jan 11, 2025 03:12:48.279869080 CET5002180192.168.2.445.9.191.182
        Jan 11, 2025 03:12:48.284651041 CET805002145.9.191.182192.168.2.4
        Jan 11, 2025 03:12:48.320828915 CET805002045.9.191.182192.168.2.4
        Jan 11, 2025 03:12:48.424184084 CET805001745.9.191.182192.168.2.4
        Jan 11, 2025 03:12:48.424657106 CET5001780192.168.2.445.9.191.182
        Jan 11, 2025 03:12:53.958633900 CET5002180192.168.2.445.9.191.182
        Jan 11, 2025 03:12:53.962428093 CET5002280192.168.2.445.9.191.182
        Jan 11, 2025 03:12:53.967817068 CET805002245.9.191.182192.168.2.4
        Jan 11, 2025 03:12:53.967900991 CET5002280192.168.2.445.9.191.182
        Jan 11, 2025 03:12:53.968050003 CET5002280192.168.2.445.9.191.182
        Jan 11, 2025 03:12:53.972826004 CET805002245.9.191.182192.168.2.4
        Jan 11, 2025 03:12:54.004796028 CET805002145.9.191.182192.168.2.4
        Jan 11, 2025 03:12:54.954988956 CET805001845.9.191.182192.168.2.4
        Jan 11, 2025 03:12:54.958725929 CET5001880192.168.2.445.9.191.182
        Jan 11, 2025 03:12:56.221091986 CET805001945.9.191.182192.168.2.4
        Jan 11, 2025 03:12:56.230390072 CET5001980192.168.2.445.9.191.182
        Jan 11, 2025 03:12:58.366452932 CET5002380192.168.2.445.9.191.182
        Jan 11, 2025 03:12:58.366451025 CET5002280192.168.2.445.9.191.182
        Jan 11, 2025 03:12:58.375468016 CET805002345.9.191.182192.168.2.4
        Jan 11, 2025 03:12:58.379724979 CET5002380192.168.2.445.9.191.182
        Jan 11, 2025 03:12:58.379724979 CET5002380192.168.2.445.9.191.182
        Jan 11, 2025 03:12:58.387900114 CET805002345.9.191.182192.168.2.4
        Jan 11, 2025 03:12:58.416475058 CET805002245.9.191.182192.168.2.4
        Jan 11, 2025 03:12:59.083738089 CET5002380192.168.2.445.9.191.182
        Jan 11, 2025 03:12:59.086446047 CET5002480192.168.2.445.9.191.182
        Jan 11, 2025 03:12:59.091383934 CET805002445.9.191.182192.168.2.4
        Jan 11, 2025 03:12:59.091711044 CET5002480192.168.2.445.9.191.182
        Jan 11, 2025 03:12:59.091902971 CET5002480192.168.2.445.9.191.182
        Jan 11, 2025 03:12:59.096681118 CET805002445.9.191.182192.168.2.4
        Jan 11, 2025 03:12:59.128838062 CET805002345.9.191.182192.168.2.4
        Jan 11, 2025 03:13:06.991738081 CET5002480192.168.2.445.9.191.182
        Jan 11, 2025 03:13:07.000396967 CET5002580192.168.2.445.9.191.182
        Jan 11, 2025 03:13:07.005702019 CET805002545.9.191.182192.168.2.4
        Jan 11, 2025 03:13:07.008495092 CET5002580192.168.2.445.9.191.182
        Jan 11, 2025 03:13:07.008611917 CET5002580192.168.2.445.9.191.182
        Jan 11, 2025 03:13:07.013353109 CET805002545.9.191.182192.168.2.4
        Jan 11, 2025 03:13:07.036855936 CET805002445.9.191.182192.168.2.4
        Jan 11, 2025 03:13:07.846272945 CET805002045.9.191.182192.168.2.4
        Jan 11, 2025 03:13:07.846350908 CET5002080192.168.2.445.9.191.182
        Jan 11, 2025 03:13:09.694442034 CET805002145.9.191.182192.168.2.4
        Jan 11, 2025 03:13:09.694509029 CET5002180192.168.2.445.9.191.182
        Jan 11, 2025 03:13:15.347230911 CET805002245.9.191.182192.168.2.4
        Jan 11, 2025 03:13:15.347290039 CET5002280192.168.2.445.9.191.182
        Jan 11, 2025 03:13:17.626432896 CET5002580192.168.2.445.9.191.182
        Jan 11, 2025 03:13:17.627325058 CET5002680192.168.2.445.9.191.182
        Jan 11, 2025 03:13:17.632333040 CET805002645.9.191.182192.168.2.4
        Jan 11, 2025 03:13:17.632456064 CET5002680192.168.2.445.9.191.182
        Jan 11, 2025 03:13:17.632664919 CET5002680192.168.2.445.9.191.182
        Jan 11, 2025 03:13:17.637394905 CET805002645.9.191.182192.168.2.4
        Jan 11, 2025 03:13:17.676835060 CET805002545.9.191.182192.168.2.4
        Jan 11, 2025 03:13:19.772202015 CET805002345.9.191.182192.168.2.4
        Jan 11, 2025 03:13:19.772275925 CET5002380192.168.2.445.9.191.182
        TimestampSource PortDest PortSource IPDest IP
        Jan 11, 2025 03:09:12.489413023 CET6238553192.168.2.41.1.1.1
        Jan 11, 2025 03:09:12.673319101 CET53623851.1.1.1192.168.2.4
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jan 11, 2025 03:09:12.489413023 CET192.168.2.41.1.1.10x1a21Standard query (0)xianggrhen.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 11, 2025 03:09:12.673319101 CET1.1.1.1192.168.2.40x1a21No error (0)xianggrhen.com45.9.191.182A (IP address)IN (0x0001)false
        • xianggrhen.com
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.44973145.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:09:12.766546965 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.44973845.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:09:34.168575048 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        2192.168.2.44973945.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:09:55.565181971 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        3192.168.2.44983145.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:10:16.927743912 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        4192.168.2.44995945.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:10:38.301742077 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        5192.168.2.45000845.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:10:45.292859077 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        6192.168.2.45000945.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:10:55.590342045 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        7192.168.2.45001045.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:11:09.887082100 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        8192.168.2.45001145.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:11:16.372122049 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        9192.168.2.45001245.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:11:17.004757881 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        10192.168.2.45001345.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:11:38.403243065 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        11192.168.2.45001445.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:11:40.310342073 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        12192.168.2.45001545.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:11:44.449440002 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        13192.168.2.45001645.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:12:05.701138020 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        14192.168.2.45001745.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:12:27.076484919 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        15192.168.2.45001845.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:12:33.576138020 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        16192.168.2.45001945.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:12:34.857395887 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        17192.168.2.45002045.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:12:46.434233904 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        18192.168.2.45002145.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:12:48.279869080 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        19192.168.2.45002245.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:12:53.968050003 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        20192.168.2.45002345.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:12:58.379724979 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        21192.168.2.45002445.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:12:59.091902971 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        22192.168.2.45002545.9.191.182807552C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:13:07.008611917 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination Port
        23192.168.2.45002645.9.191.18280
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:13:17.632664919 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Target ID:0
        Start time:21:09:11
        Start date:10/01/2025
        Path:C:\Users\user\Desktop\oe8KMVNFEG.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\oe8KMVNFEG.exe"
        Imagebase:0xcd0000
        File size:355'824 bytes
        MD5 hash:E10ABAD4B0666E5ACF257E4603453975
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:7.3%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:70
          Total number of Limit Nodes:2
          execution_graph 15198 17046c0 15199 17046d0 15198->15199 15202 1704260 15199->15202 15201 17046d5 15203 170426b 15202->15203 15206 1704270 15203->15206 15205 170476d 15205->15201 15207 170427b 15206->15207 15210 1704408 15207->15210 15209 1704842 15209->15205 15211 1704413 15210->15211 15214 1704438 15211->15214 15213 1704954 15213->15209 15215 1704443 15214->15215 15217 170793b 15215->15217 15221 170a358 15215->15221 15216 1707979 15216->15213 15217->15216 15225 170c441 15217->15225 15230 170c450 15217->15230 15235 170a390 15221->15235 15238 170a37f 15221->15238 15222 170a36e 15222->15217 15226 170c450 15225->15226 15227 170c495 15226->15227 15247 170c600 15226->15247 15251 170c5f2 15226->15251 15227->15216 15231 170c471 15230->15231 15232 170c495 15231->15232 15233 170c600 GetModuleHandleW 15231->15233 15234 170c5f2 GetModuleHandleW 15231->15234 15232->15216 15233->15232 15234->15232 15242 170a488 15235->15242 15236 170a39f 15236->15222 15239 170a390 15238->15239 15241 170a488 GetModuleHandleW 15239->15241 15240 170a39f 15240->15222 15241->15240 15243 170a499 15242->15243 15244 170a4bc 15242->15244 15243->15244 15245 170a6c0 GetModuleHandleW 15243->15245 15244->15236 15246 170a6ed 15245->15246 15246->15236 15248 170c60d 15247->15248 15249 170c647 15248->15249 15255 170ace0 15248->15255 15249->15227 15252 170c600 15251->15252 15253 170c647 15252->15253 15254 170ace0 GetModuleHandleW 15252->15254 15253->15227 15254->15253 15256 170aceb 15255->15256 15258 170d358 15256->15258 15259 170c774 15256->15259 15258->15258 15260 170c77f 15259->15260 15261 1704438 GetModuleHandleW 15260->15261 15262 170d3c7 15261->15262 15262->15258 15263 170cb18 15264 170cb5e 15263->15264 15268 170cce7 15264->15268 15273 170ccf8 15264->15273 15265 170cc4b 15269 170ccf2 15268->15269 15272 170cca6 15268->15272 15276 170c710 15269->15276 15272->15265 15274 170c710 DuplicateHandle 15273->15274 15275 170cd26 15274->15275 15275->15265 15277 170cd60 DuplicateHandle 15276->15277 15278 170cd26 15277->15278 15278->15265 15279 1704698 15280 17046a6 15279->15280 15283 1703e70 15280->15283 15282 17046af 15284 1703e7b 15283->15284 15285 1704260 GetModuleHandleW 15284->15285 15286 17046d5 15285->15286 15286->15282

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 557 170a488-170a497 558 170a4c3-170a4c7 557->558 559 170a499-170a4a6 call 17097f4 557->559 561 170a4c9-170a4d3 558->561 562 170a4db-170a51c 558->562 566 170a4a8 559->566 567 170a4bc 559->567 561->562 568 170a529-170a537 562->568 569 170a51e-170a526 562->569 616 170a4ae call 170a720 566->616 617 170a4ae call 170a710 566->617 567->558 570 170a539-170a53e 568->570 571 170a55b-170a55d 568->571 569->568 573 170a540-170a547 call 1709800 570->573 574 170a549 570->574 576 170a560-170a567 571->576 572 170a4b4-170a4b6 572->567 575 170a5f8-170a605 572->575 578 170a54b-170a559 573->578 574->578 587 170a60b-170a670 575->587 579 170a574-170a57b 576->579 580 170a569-170a571 576->580 578->576 581 170a588-170a591 call 1709810 579->581 582 170a57d-170a585 579->582 580->579 588 170a593-170a59b 581->588 589 170a59e-170a5a3 581->589 582->581 607 170a672-170a6b8 587->607 588->589 590 170a5c1-170a5c5 589->590 591 170a5a5-170a5ac 589->591 614 170a5c8 call 170adf0 590->614 615 170a5c8 call 170ae20 590->615 591->590 593 170a5ae-170a5be call 1709820 call 1709830 591->593 593->590 596 170a5cb-170a5ce 597 170a5d0-170a5ee 596->597 598 170a5f1-170a5f7 596->598 597->598 609 170a6c0-170a6eb GetModuleHandleW 607->609 610 170a6ba-170a6bd 607->610 611 170a6f4-170a708 609->611 612 170a6ed-170a6f3 609->612 610->609 612->611 614->596 615->596 616->572 617->572
          APIs
          • GetModuleHandleW.KERNEL32(00000000), ref: 0170A6DE
          Memory Dump Source
          • Source File: 00000000.00000002.4209485556.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1700000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 8082b265febf4fb42f9178cf5a7e37b045f3ae53737e3c646a79ce31a932d6b7
          • Instruction ID: 755becd46d0a3a25c12f2ed7d7c297150de675107e7c8e13838f3a7757e332b6
          • Opcode Fuzzy Hash: 8082b265febf4fb42f9178cf5a7e37b045f3ae53737e3c646a79ce31a932d6b7
          • Instruction Fuzzy Hash: 10812170A00B05CFD725DF29D48475AFBF1FB88204F108A2AD58AD7B90DB75E949CB90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 618 170c710-170cdf4 DuplicateHandle 620 170cdf6-170cdfc 618->620 621 170cdfd-170ce1a 618->621 620->621
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0170CD26,?,?,?,?,?), ref: 0170CDE7
          Memory Dump Source
          • Source File: 00000000.00000002.4209485556.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1700000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 56a69a9defa67ce6a4e78274aab09350fe8c4fdeb40db5ef771500d6c50542cc
          • Instruction ID: 7b636065192a59d6be94743fdbc8379af1efb8d9837b6dc533a9548a79ff2661
          • Opcode Fuzzy Hash: 56a69a9defa67ce6a4e78274aab09350fe8c4fdeb40db5ef771500d6c50542cc
          • Instruction Fuzzy Hash: C421D2B5900248DFDB11CFAAD984ADEFFF8EB48320F14845AE954A7250D374A940CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 624 170cd58-170cdf4 DuplicateHandle 625 170cdf6-170cdfc 624->625 626 170cdfd-170ce1a 624->626 625->626
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0170CD26,?,?,?,?,?), ref: 0170CDE7
          Memory Dump Source
          • Source File: 00000000.00000002.4209485556.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1700000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 3cbdf4b33ddf4d50f8aaef5c38e336cf1704ded6fa5208df49dccf81f4443f2e
          • Instruction ID: 2b63193ce109cbaf6d541ad88ebf31ca15278f2f8590d459dd23cec59b988965
          • Opcode Fuzzy Hash: 3cbdf4b33ddf4d50f8aaef5c38e336cf1704ded6fa5208df49dccf81f4443f2e
          • Instruction Fuzzy Hash: 5421E3B5D00218DFDB10CF99D984AEEBFF9EB48324F14845AE954A7250D378A940CF65

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 629 170a678-170a6b8 630 170a6c0-170a6eb GetModuleHandleW 629->630 631 170a6ba-170a6bd 629->631 632 170a6f4-170a708 630->632 633 170a6ed-170a6f3 630->633 631->630 633->632
          APIs
          • GetModuleHandleW.KERNEL32(00000000), ref: 0170A6DE
          Memory Dump Source
          • Source File: 00000000.00000002.4209485556.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1700000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 0edcad6297fc41d80cbef283949bfccd9b2ae7f2b08d401f1aac19ef3f2daac4
          • Instruction ID: 9810af6e2f1a8dd0482edd5b69427d6ac979f794fbfd4150089ebac60db70def
          • Opcode Fuzzy Hash: 0edcad6297fc41d80cbef283949bfccd9b2ae7f2b08d401f1aac19ef3f2daac4
          • Instruction Fuzzy Hash: 8A11E0B5C00749CFDB10CF9AC844ADEFBF4EB88324F14842AD969A7650C379A545CFA5
          Memory Dump Source
          • Source File: 00000000.00000002.4208924807.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_123d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 45c2c360c1cbeb4ffdd0c8a90a1365dcffd125f5f7a91b28049df2c04a4896c8
          • Instruction ID: aac7ec503a7192462ee685120abf68b0f76841aaf0804ad3c1c1ebfa0681102b
          • Opcode Fuzzy Hash: 45c2c360c1cbeb4ffdd0c8a90a1365dcffd125f5f7a91b28049df2c04a4896c8
          • Instruction Fuzzy Hash: 892148B1510209DFDB01DF48E9C0B27BF65FBC4318F60C169EA0A0B296C376D455C7A1
          Memory Dump Source
          • Source File: 00000000.00000002.4208964952.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_124d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f7fe300090ae8dfc1ff01947f67a363229b24cf16801a9f6a19b0780b34d337a
          • Instruction ID: 3e9bf77fb310cebe521fdc4a533cb71e1ab13f69b8c8fc0cfd08e9feaa5ad98a
          • Opcode Fuzzy Hash: f7fe300090ae8dfc1ff01947f67a363229b24cf16801a9f6a19b0780b34d337a
          • Instruction Fuzzy Hash: 23214270214208DFCB19DFA8D984B26BFA1EB94314F20C56DD90A4B256C37AD407CA61
          Memory Dump Source
          • Source File: 00000000.00000002.4208964952.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_124d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f538d7ea208d202c13ce37ea958081171c35d2a97689468923043d266a2739c8
          • Instruction ID: e7112512cbd9b9ce16659d92ba835b3be9fd12a33955ea78e8e5dc54c66937ca
          • Opcode Fuzzy Hash: f538d7ea208d202c13ce37ea958081171c35d2a97689468923043d266a2739c8
          • Instruction Fuzzy Hash: E5219F755083849FCB07CF64D994B11BF71EB56314F28C5EAD9498F2A7C33A980ACB62
          Memory Dump Source
          • Source File: 00000000.00000002.4208924807.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_123d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
          • Instruction ID: 4b618a2327f2d77333be03eca209e4e451340d4ced17cf43231878de50929f29
          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
          • Instruction Fuzzy Hash: 8A1103B2904244CFDB12CF48D5C4B16BF72FB84324F24C1A9DA090B257C336D45ACBA2
          Memory Dump Source
          • Source File: 00000000.00000002.4208924807.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_123d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9dad2672970ed42d430b08a88e523d7f4b530509c66b8acd279fcb5968fce2de
          • Instruction ID: 8bd087ffcd789f80fe0ff7b0e96287c4fe1fc0e76e7c6fa9e9c2e7d2a2639826
          • Opcode Fuzzy Hash: 9dad2672970ed42d430b08a88e523d7f4b530509c66b8acd279fcb5968fce2de
          • Instruction Fuzzy Hash: 6B01DBB10183899EE7164A59DDC4B67FFD8EF85324F58C42AEE094A196C279D840C671
          Memory Dump Source
          • Source File: 00000000.00000002.4208924807.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_123d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2fb5a31b24e674beb9959245ccfadf9f54bb744d1788a56cfd4d3be0e22e3b07
          • Instruction ID: 743d966a2e274e041d454c0fc01941d4f82fe6b600ce9d853ac712cd28d890c4
          • Opcode Fuzzy Hash: 2fb5a31b24e674beb9959245ccfadf9f54bb744d1788a56cfd4d3be0e22e3b07
          • Instruction Fuzzy Hash: 94F096B14083889EE7158E1ADDC4B62FFA8EF85734F18C45AEE484F2D6C2799844CA71
          Memory Dump Source
          • Source File: 00000000.00000002.4209485556.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1700000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 7e4b8622535f72149491a4f67d3a31ba66b1e95913c2fb194101b5ceba30ff0b
          • Instruction ID: b96b6663754aa27d96d0c6687ca2515334b404510037a3c9c7e56ef5b54b26ca
          • Opcode Fuzzy Hash: 7e4b8622535f72149491a4f67d3a31ba66b1e95913c2fb194101b5ceba30ff0b
          • Instruction Fuzzy Hash: CE12EBF6C857498BD310CF65EC4C1A9FBB1B741398BD24A09CA622F2E1E7B4156ACF44
          Memory Dump Source
          • Source File: 00000000.00000002.4209485556.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1700000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9422cb2cdbc5b8940a745bf0b3e0370daa9360855b1e3648ed3e5bc937aa925f
          • Instruction ID: 28edfb64ff2275cb18ab7077f9bcafb2b452d85aab219ced53a256c6667829a6
          • Opcode Fuzzy Hash: 9422cb2cdbc5b8940a745bf0b3e0370daa9360855b1e3648ed3e5bc937aa925f
          • Instruction Fuzzy Hash: 5FA13C32A0030ACFCF16DFA5D84459EFBF2FF88300B15496AE905AB2A5DF31A955CB50
          Memory Dump Source
          • Source File: 00000000.00000002.4209485556.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1700000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2482bf7622673788335222f6b4877bd1a6ab8cefd73e92e9a3b2979506bb1fc6
          • Instruction ID: dc1ec35aa4510c693fb5baa1cd4fe39ca0909eec6c5e40a7fe88343a9caf013f
          • Opcode Fuzzy Hash: 2482bf7622673788335222f6b4877bd1a6ab8cefd73e92e9a3b2979506bb1fc6
          • Instruction Fuzzy Hash: 1CC12DB2C8470D8BD710CF75EC481A9FBB1FB85394F924A09D6622B2D1EBB81466CF44