Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tsles(x86).exe

Overview

General Information

Sample name:tsles(x86).exe
Analysis ID:1634106
MD5:2711a173bfd3792b916ef4ca215f3d7f
SHA1:5ad347facaf2c42dcf4eb79ebe842d66689093de
SHA256:a730ada336ed4fdc37de1700299ca5ab992075e102b5a384debc71af22caba61
Tags:exeuser-TornadoAV_dev
Infos:

Detection

LummaC Stealer
Score:80
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
Contains functionality to detect sleep reduction / modifications
Joe Sandbox ML detected suspicious sample
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
PE file contains executable resources (Code or Archives)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files

Classification

  • System is w10x64
  • tsles(x86).exe (PID: 6792 cmdline: "C:\Users\user\Desktop\tsles(x86).exe" MD5: 2711A173BFD3792B916EF4CA215F3D7F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    0.2.tsles(x86).exe.12e0000.1.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-03-10T19:45:33.600788+010020283713Unknown Traffic192.168.2.1249704104.73.234.102443TCP
      2025-03-10T19:46:59.507074+010020283713Unknown Traffic192.168.2.1249692104.21.93.40443TCP
      2025-03-10T19:47:31.506968+010020283713Unknown Traffic192.168.2.1249703104.73.234.102443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://catterjur.run/dAvira URL Cloud: Label: malware
      Source: https://sterpickced.digital/TAvira URL Cloud: Label: malware
      Source: https://sterpickced.digital/ZAvira URL Cloud: Label: malware
      Source: https://fostinjec.today/LksNAzwAvira URL Cloud: Label: malware
      Source: https://fostinjec.today/LksNAz:Avira URL Cloud: Label: malware
      Source: https://fostinjec.today/LksNAzSAvira URL Cloud: Label: malware
      Source: https://tonedanswered.today/Avira URL Cloud: Label: malware
      Source: https://catterjur.run/boSnzhu3Avira URL Cloud: Label: malware
      Source: https://catterjur.run/Avira URL Cloud: Label: malware
      Source: https://catterjur.run/:Avira URL Cloud: Label: malware
      Source: https://sterpickced.digital/Avira URL Cloud: Label: malware
      Source: https://sterpickced.digital/lAvira URL Cloud: Label: malware
      Source: https://modelshiverd.icu/bJhnsjAvira URL Cloud: Label: malware
      Source: https://fostinjec.today/LksNAzAvira URL Cloud: Label: malware
      Source: https://orangemyther.live/IozZiAvira URL Cloud: Label: malware
      Source: https://sterpickced.digital/l_Avira URL Cloud: Label: malware
      Source: tsles(x86).exeVirustotal: Detection: 24%Perma Link
      Source: tsles(x86).exeReversingLabs: Detection: 26%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.7% probability
      Source: 00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmpString decryptor: tonedanswered.today/SMjdU
      Source: 00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmpString decryptor: begindecafer.world/QwdZdf
      Source: 00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmpString decryptor: garagedrootz.top/oPsoJAN
      Source: 00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmpString decryptor: modelshiverd.icu/bJhnsj
      Source: 00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmpString decryptor: arisechairedd.shop/JnsHY
      Source: 00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmpString decryptor: catterjur.run/boSnzhu
      Source: 00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmpString decryptor: orangemyther.live/IozZ
      Source: 00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmpString decryptor: fostinjec.today/LksNAz
      Source: tsles(x86).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: tsles(x86).exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx+14h]0_2_012EDA3A
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx+317AB538h]0_2_012EDA3A
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then lea eax, dword ptr [ecx-6C0B83CEh]0_2_012ED780
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-25088CECh]0_2_012F2124
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-38B2FA5Ch]0_2_01312120
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov word ptr [eax], cx0_2_01312120
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+12h]0_2_012EC130
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov word ptr [eax], cx0_2_01309910
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-313E762Ah]0_2_0132B900
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp dword ptr [esi+edx*8], F7D6D3F6h0_2_0132D960
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov dword ptr [esp+04h], ecx0_2_012EE174
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-313E762Ah]0_2_0132B9B0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ebx, byte ptr [esp+edx-443B8DA2h]0_2_012FD99F
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov word ptr [eax], dx0_2_012FD99F
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-000000B2h]0_2_012F0994
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp word ptr [edi+ebx], 0000h0_2_0132C1D0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov dword ptr [esp], ebx0_2_013169C1
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov dword ptr [esp+04h], eax0_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov word ptr [edx], cx0_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-4AF8CFA6h]0_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov dword ptr [esp+04h], ecx0_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 93A82FD1h0_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov word ptr [eax], cx0_2_012F1822
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx esi, byte ptr [esp+eax]0_2_013100B0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ebx, byte ptr [esp+edx-443B8DA2h]0_2_012FE0AC
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov word ptr [eax], dx0_2_012FE0AC
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_01320880
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movsx edx, byte ptr [ebx+ecx]0_2_0132A88E
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+04h]0_2_013290EF
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 743EDB10h0_2_0132C8C0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ebp, byte ptr [esp+esi-000000FEh]0_2_0132D0C0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov ebp, eax0_2_012E8B20
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+12EB444Ah]0_2_012EFB20
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov ebp, edx0_2_0132C320
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]0_2_0130D32F
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov dword ptr [esp+04h], ecx0_2_012FD315
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+02h]0_2_012F1368
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov eax, ecx0_2_012FEB66
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp word ptr [eax+edx+02h], 0000h0_2_01324B60
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_012FA370
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov byte ptr [esi], al0_2_0131836E
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+10h]0_2_01300B40
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+10h]0_2_01300B40
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov word ptr [eax], cx0_2_0130CBB0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_012EA390
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_012EA390
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-2B12B9D2h]0_2_0130F3C0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov byte ptr [edi], cl0_2_013173CB
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 720EEED4h0_2_01328240
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+08h]0_2_01328240
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+6C0B83D6h]0_2_01328240
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-313E762Ah]0_2_0132BA40
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h0_2_013092A0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-79B0712Ah]0_2_0130DAA2
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edx, word ptr [eax]0_2_0130DAA2
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h0_2_0130DAA2
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov edx, edi0_2_01303A80
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000084h]0_2_012FE2C6
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov word ptr [eax], cx0_2_01312540
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov word ptr [edx], cx0_2_012FB55A
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-4AF8CFA6h]0_2_012FB55A
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov dword ptr [esp+04h], ecx0_2_012FB55A
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 93A82FD1h0_2_012FB55A
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+03h]0_2_01304430
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp word ptr [ebp+eax+00h], 0000h0_2_012FA430
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov byte ptr [esi], al0_2_0131845D
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov dword ptr [esp+04h], eax0_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov word ptr [edx], cx0_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-4AF8CFA6h]0_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov dword ptr [esp+04h], ecx0_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 93A82FD1h0_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+5Dh]0_2_012EDC9E
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov byte ptr [edi], cl0_2_013174D1
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ebx, byte ptr [esp+ebp+02h]0_2_01309F30
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68h]0_2_012FFF37
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then jmp eax0_2_012EF769
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 8D94E5DFh0_2_01324750
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edi, byte ptr [esp+eax]0_2_01324750
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+03h]0_2_01305F40
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+08h]0_2_01302792
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-313E762Ah]0_2_0132B790
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+62h]0_2_012F2F82
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-52h]0_2_01310670
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+2Ch]0_2_01310650
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-313E762Ah]0_2_0132B680
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_01313EE0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h0_2_012FEEFE
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000084h]0_2_012FEEFE
      Source: Joe Sandbox ViewIP Address: 104.73.234.102 104.73.234.102
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.12:49692 -> 104.21.93.40:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.12:49703 -> 104.73.234.102:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.12:49704 -> 104.73.234.102:443
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: tonedanswered.today
      Source: global trafficDNS traffic detected: DNS query: begindecafer.world
      Source: global trafficDNS traffic detected: DNS query: garagedrootz.top
      Source: global trafficDNS traffic detected: DNS query: modelshiverd.icu
      Source: global trafficDNS traffic detected: DNS query: arisechairedd.shop
      Source: global trafficDNS traffic detected: DNS query: catterjur.run
      Source: global trafficDNS traffic detected: DNS query: orangemyther.live
      Source: global trafficDNS traffic detected: DNS query: fostinjec.today
      Source: global trafficDNS traffic detected: DNS query: sterpickced.digital
      Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
      Source: tsles(x86).exe, 00000000.00000002.2470806516.00000000011A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://catterjur.run/
      Source: tsles(x86).exe, 00000000.00000002.2470806516.00000000011A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://catterjur.run/:
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://catterjur.run/boSnzhu3
      Source: tsles(x86).exe, 00000000.00000002.2470806516.00000000011A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://catterjur.run/d
      Source: tsles(x86).exe, 00000000.00000002.2470806516.00000000011A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fostinjec.today/LksNAz
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fostinjec.today/LksNAz:
      Source: tsles(x86).exe, 00000000.00000002.2470806516.00000000011A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fostinjec.today/LksNAzS
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fostinjec.today/LksNAzw
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://modelshiverd.icu/bJhnsj
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://orangemyther.live/IozZi
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001169000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
      Source: tsles(x86).exe, 00000000.00000002.2470577211.0000000000DE3000.00000004.00000010.00020000.00000000.sdmp, tsles(x86).exe, 00000000.00000002.2470806516.0000000001169000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199822375128
      Source: tsles(x86).exe, 00000000.00000002.2470806516.000000000118D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199822375128.36
      Source: tsles(x86).exe, 00000000.00000002.2470806516.000000000118D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199822375128.36Wd
      Source: tsles(x86).exe, 00000000.00000002.2470806516.000000000118D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199822375128Fk
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001181000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199822375128g
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001181000.00000004.00000020.00020000.00000000.sdmp, tsles(x86).exe, 00000000.00000002.2470806516.0000000001164000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com:443/profiles/76561199822375128
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sterpickced.digital/
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sterpickced.digital/T
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sterpickced.digital/Z
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sterpickced.digital/l
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sterpickced.digital/l_
      Source: tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tonedanswered.today/
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
      Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0131EF10 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,0_2_0131EF10
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0131EF10 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,0_2_0131EF10
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0131F0B0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,0_2_0131F0B0
      Source: C:\Users\user\Desktop\tsles(x86).exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01141E50 NtAllocateVirtualMemory,LoadLibraryA,NtProtectVirtualMemory,NtProtectVirtualMemory,0_2_01141E50
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01141000 NtAllocateVirtualMemory,0_2_01141000
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_006015000_2_00601500
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012EDA3A0_2_012EDA3A
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013297750_2_01329775
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012ED7800_2_012ED780
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012EE6600_2_012EE660
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013121200_2_01312120
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013099100_2_01309910
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013089000_2_01308900
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132B9000_2_0132B900
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0131617E0_2_0131617E
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013251600_2_01325160
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013109620_2_01310962
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012F39AF0_2_012F39AF
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132B9B00_2_0132B9B0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013069B40_2_013069B4
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013179A00_2_013179A0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013179AF0_2_013179AF
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013001800_2_01300180
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012FD99F0_2_012FD99F
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013161D80_2_013161D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013111DA0_2_013111DA
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012FB1D80_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012F18220_2_012F1822
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012E90300_2_012E9030
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012E70060_2_012E7006
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012E48020_2_012E4802
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0130D8500_2_0130D850
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013100B00_2_013100B0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012FE0AC0_2_012FE0AC
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013118B60_2_013118B6
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132C0A00_2_0132C0A0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132A88E0_2_0132A88E
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013290EF0_2_013290EF
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013238C00_2_013238C0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132C8C00_2_0132C8C0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132D0C00_2_0132D0C0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012E8B200_2_012E8B20
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012EFB200_2_012EFB20
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132C3200_2_0132C320
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0130D32F0_2_0130D32F
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012FD3150_2_012FD315
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012F63120_2_012F6312
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01324B600_2_01324B60
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0131DB6D0_2_0131DB6D
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01300B400_2_01300B40
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012E2B500_2_012E2B50
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0130CBB00_2_0130CBB0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013253900_2_01325390
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012EA3900_2_012EA390
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013173CB0_2_013173CB
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012ECBD00_2_012ECBD0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0131B2380_2_0131B238
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012FFA3D0_2_012FFA3D
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013232500_2_01323250
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013282400_2_01328240
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132BA400_2_0132BA40
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013092A00_2_013092A0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0130DAA20_2_0130DAA2
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01303A800_2_01303A80
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0130BA810_2_0130BA81
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01311A8C0_2_01311A8C
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013162F90_2_013162F9
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01316AE50_2_01316AE5
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012ED2F00_2_012ED2F0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012FE2C60_2_012FE2C6
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01318AC00_2_01318AC0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0131C5300_2_0131C530
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0131357B0_2_0131357B
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01327D500_2_01327D50
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012FCD450_2_012FCD45
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013125400_2_01312540
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012FB55A0_2_012FB55A
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013045B00_2_013045B0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0131E5A00_2_0131E5A0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012E95B00_2_012E95B0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012E35800_2_012E3580
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013005890_2_01300589
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012EB5900_2_012EB590
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012F55F60_2_012F55F6
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01323C300_2_01323C30
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012FA4300_2_012FA430
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012EC4700_2_012EC470
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013154400_2_01315440
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012FB1D80_2_012FB1D8
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012EDC9E0_2_012EDC9E
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132CC800_2_0132CC80
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01315CF00_2_01315CF0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132BCE00_2_0132BCE0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01321CC20_2_01321CC2
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012E3F200_2_012E3F20
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0130F7600_2_0130F760
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013247500_2_01324750
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013257470_2_01325747
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0131BFA30_2_0131BFA3
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132B7900_2_0132B790
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012E27900_2_012E2790
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012F6F900_2_012F6F90
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01322FF00_2_01322FF0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012E7E300_2_012E7E30
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01319E080_2_01319E08
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013106700_2_01310670
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132266C0_2_0132266C
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01303E500_2_01303E50
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013106500_2_01310650
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132BE900_2_0132BE90
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0132B6800_2_0132B680
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_012FEEFE0_2_012FEEFE
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_013276C00_2_013276C0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_011410000_2_01141000
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_011427D00_2_011427D0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: String function: 012FA420 appears 110 times
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: String function: 012EB380 appears 49 times
      Source: tsles(x86).exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: tsles(x86).exe, 00000000.00000002.2470484747.0000000000C2B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMediatomb.exeH vs tsles(x86).exe
      Source: tsles(x86).exe, 00000000.00000003.1719540642.000000000310A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMediatomb.exeH vs tsles(x86).exe
      Source: tsles(x86).exeBinary or memory string: OriginalFilenameMediatomb.exeH vs tsles(x86).exe
      Source: tsles(x86).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: classification engineClassification label: mal80.troj.evad.winEXE@1/0@11/2
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_006012B0 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,CloseHandle,Process32NextW,CloseHandle,GetTickCount,GetTickCount,GlobalMemoryStatusEx,GetSystemInfo,IsDebuggerPresent,0_2_006012B0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0131DB6D CoCreateInstance,0_2_0131DB6D
      Source: tsles(x86).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\tsles(x86).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: tsles(x86).exeVirustotal: Detection: 24%
      Source: tsles(x86).exeReversingLabs: Detection: 26%
      Source: C:\Users\user\Desktop\tsles(x86).exeFile read: C:\Users\user\Desktop\tsles(x86).exeJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: ????? .dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeSection loaded: schannel.dllJump to behavior
      Source: tsles(x86).exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: tsles(x86).exeStatic file information: File size 6667776 > 1048576
      Source: tsles(x86).exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x627000
      Source: tsles(x86).exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: tsles(x86).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_006014800_2_00601480
      Source: tsles(x86).exe, tsles(x86).exe, 00000000.00000002.2470453087.0000000000C2A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: PROCMON.EXE
      Source: tsles(x86).exe, 00000000.00000002.2470427335.0000000000C28000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: VERROR MESSAGEERROR NOT SUPPORT SYSTEMMPVMP32ENTRYKERNEL32.DLLERROR MESSAGEERROR NOT SUPPORT SYSTEMERROR MESSAGEERROR NOT SUPPORT SYSTEMERROR MESSAGEERROR NOT SUPPORT SYSTEMVMTOOLSD.EXECUCKOO_SVC.EXEXENSERVICE.EXEPROCMON.EXE)
      Source: tsles(x86).exe, tsles(x86).exe, 00000000.00000002.2470453087.0000000000C2A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: XENSERVICE.EXE
      Source: tsles(x86).exeBinary or memory string: BERROR MESSAGEERROR NOT SUPPORT SYSTEMMPVMP32ENTRYKERNEL32.DLLERROR MESSAGEERROR NOT SUPPORT SYSTEMERROR MESSAGEERROR NOT SUPPORT SYSTEMERROR MESSAGEERROR NOT SUPPORT SYSTEMVMTOOLSD.EXECUCKOO_SVC.EXEXENSERVICE.EXEPROCMON.EXE)
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_006014800_2_00601480
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_00601710 GetSystemInfo,MessageBoxW,GetModuleHandleW,GetProcAddress,MessageBoxW,LoadLibraryW,MessageBoxW,FreeLibrary,MessageBoxW,FreeLibrary,0_2_00601710
      Source: tsles(x86).exe, 00000000.00000002.2470453087.0000000000C2A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: vmtoolsd.exe
      Source: tsles(x86).exeBinary or memory string: bError messageError not support systemMpVmp32Entrykernel32.dllError messageError not support systemError messageError not support systemError messageError not support systemvmtoolsd.execuckoo_svc.exexenservice.exeprocmon.exe)
      Source: tsles(x86).exe, 00000000.00000002.2470806516.00000000011A3000.00000004.00000020.00020000.00000000.sdmp, tsles(x86).exe, 00000000.00000002.2470806516.0000000001155000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: tsles(x86).exe, 00000000.00000002.2470427335.0000000000C28000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: vError messageError not support systemMpVmp32Entrykernel32.dllError messageError not support systemError messageError not support systemError messageError not support systemvmtoolsd.execuckoo_svc.exexenservice.exeprocmon.exe)
      Source: C:\Users\user\Desktop\tsles(x86).exeAPI call chain: ExitProcess graph end nodegraph_0-23696
      Source: C:\Users\user\Desktop\tsles(x86).exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01329660 LdrInitializeThunk,0_2_01329660
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_006012B0 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,CloseHandle,Process32NextW,CloseHandle,GetTickCount,GetTickCount,GlobalMemoryStatusEx,GetSystemInfo,IsDebuggerPresent,0_2_006012B0
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_00601170 mov eax, dword ptr fs:[00000030h]0_2_00601170
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01141E50 mov ecx, dword ptr fs:[00000030h]0_2_01141E50
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_01142970 mov eax, dword ptr fs:[00000030h]0_2_01142970
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_00629C66 GetProcessHeap,0_2_00629C66
      Source: C:\Users\user\Desktop\tsles(x86).exeCode function: 0_2_0062EF56 GetVersion,GetLastError,0_2_0062EF56
      Source: tsles(x86).exe, tsles(x86).exe, 00000000.00000002.2470453087.0000000000C2A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 0.2.tsles(x86).exe.12e0000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 0.2.tsles(x86).exe.12e0000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Deobfuscate/Decode Files or Information
      OS Credential Dumping241
      Security Software Discovery
      Remote Services1
      Screen Capture
      12
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      DLL Side-Loading
      LSASS Memory2
      Process Discovery
      Remote Desktop Protocol1
      Archive Collected Data
      1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
      Obfuscated Files or Information
      Security Account Manager3
      System Information Discovery
      SMB/Windows Admin Shares2
      Clipboard Data
      2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      tsles(x86).exe25%VirustotalBrowse
      tsles(x86).exe26%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://catterjur.run/d100%Avira URL Cloudmalware
      https://sterpickced.digital/T100%Avira URL Cloudmalware
      https://sterpickced.digital/Z100%Avira URL Cloudmalware
      https://fostinjec.today/LksNAzw100%Avira URL Cloudmalware
      https://fostinjec.today/LksNAz:100%Avira URL Cloudmalware
      https://fostinjec.today/LksNAzS100%Avira URL Cloudmalware
      https://tonedanswered.today/100%Avira URL Cloudmalware
      https://catterjur.run/boSnzhu3100%Avira URL Cloudmalware
      https://catterjur.run/100%Avira URL Cloudmalware
      https://catterjur.run/:100%Avira URL Cloudmalware
      https://sterpickced.digital/100%Avira URL Cloudmalware
      https://sterpickced.digital/l100%Avira URL Cloudmalware
      https://modelshiverd.icu/bJhnsj100%Avira URL Cloudmalware
      https://fostinjec.today/LksNAz100%Avira URL Cloudmalware
      https://orangemyther.live/IozZi100%Avira URL Cloudmalware
      https://sterpickced.digital/l_100%Avira URL Cloudmalware
      NameIPActiveMaliciousAntivirus DetectionReputation
      steamcommunity.com
      104.73.234.102
      truefalse
        high
        tonedanswered.today
        104.21.93.40
        truetrue
          unknown
          modelshiverd.icu
          unknown
          unknownfalse
            high
            garagedrootz.top
            unknown
            unknownfalse
              high
              fostinjec.today
              unknown
              unknownfalse
                high
                catterjur.run
                unknown
                unknownfalse
                  high
                  sterpickced.digital
                  unknown
                  unknownfalse
                    high
                    arisechairedd.shop
                    unknown
                    unknownfalse
                      high
                      orangemyther.live
                      unknown
                      unknownfalse
                        high
                        begindecafer.world
                        unknown
                        unknownfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://catterjur.run/dtsles(x86).exe, 00000000.00000002.2470806516.00000000011A3000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://sterpickced.digital/Ztsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://steamcommunity.com/profiles/76561199822375128tsles(x86).exe, 00000000.00000002.2470577211.0000000000DE3000.00000004.00000010.00020000.00000000.sdmp, tsles(x86).exe, 00000000.00000002.2470806516.0000000001169000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://catterjur.run/:tsles(x86).exe, 00000000.00000002.2470806516.00000000011A3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://catterjur.run/boSnzhu3tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://fostinjec.today/LksNAz:tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://tonedanswered.today/tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://fostinjec.today/LksNAzwtsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://sterpickced.digital/Ttsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://fostinjec.today/LksNAzStsles(x86).exe, 00000000.00000002.2470806516.00000000011A3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://steamcommunity.com/profiles/76561199822375128.36tsles(x86).exe, 00000000.00000002.2470806516.000000000118D000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://steamcommunity.com/profiles/76561199822375128Fktsles(x86).exe, 00000000.00000002.2470806516.000000000118D000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://steamcommunity.com/profiles/76561199822375128gtsles(x86).exe, 00000000.00000002.2470806516.0000000001181000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://catterjur.run/tsles(x86).exe, 00000000.00000002.2470806516.00000000011A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://sterpickced.digital/tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://sterpickced.digital/ltsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://steamcommunity.com/tsles(x86).exe, 00000000.00000002.2470806516.0000000001169000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://fostinjec.today/LksNAztsles(x86).exe, 00000000.00000002.2470806516.00000000011A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://modelshiverd.icu/bJhnsjtsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://steamcommunity.com:443/profiles/76561199822375128tsles(x86).exe, 00000000.00000002.2470806516.0000000001181000.00000004.00000020.00020000.00000000.sdmp, tsles(x86).exe, 00000000.00000002.2470806516.0000000001164000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://sterpickced.digital/l_tsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://orangemyther.live/IozZitsles(x86).exe, 00000000.00000002.2470806516.0000000001143000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://steamcommunity.com/profiles/76561199822375128.36Wdtsles(x86).exe, 00000000.00000002.2470806516.000000000118D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        104.21.93.40
                                        tonedanswered.todayUnited States
                                        13335CLOUDFLARENETUStrue
                                        104.73.234.102
                                        steamcommunity.comUnited States
                                        16625AKAMAI-ASUSfalse
                                        Joe Sandbox version:42.0.0 Malachite
                                        Analysis ID:1634106
                                        Start date and time:2025-03-10 19:44:44 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 5m 43s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:12
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:tsles(x86).exe
                                        Detection:MAL
                                        Classification:mal80.troj.evad.winEXE@1/0@11/2
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 91%
                                        • Number of executed functions: 16
                                        • Number of non-executed functions: 134
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, otelrules.svc.static.microsoft, ctldl.windowsupdate.com, c.pki.goog
                                        • Not all processes where analyzed, report is missing behavior information
                                        No simulations
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        104.73.234.102freshbodyshop.ps1Get hashmaliciousLummaC StealerBrowse
                                          IFwhIemq7R.exeGet hashmaliciousScreenConnect Tool, Amadey, LummaC Stealer, PureLog Stealer, Vidar, zgRATBrowse
                                            HjBGqnNSh1.exeGet hashmaliciousUnknownBrowse
                                              6DRdNEnOMn.exeGet hashmaliciousLummaC StealerBrowse
                                                n7a1icIo5f.exeGet hashmaliciousLummaC StealerBrowse
                                                  AaxpYFDQ32.exeGet hashmaliciousAmadey, Credential Flusher, GCleaner, LummaC Stealer, StealcBrowse
                                                    gold.rim.exeGet hashmaliciousLummaC StealerBrowse
                                                      alex111111.exeGet hashmaliciousLummaC Stealer, PureLog StealerBrowse
                                                        alex1231231123.exeGet hashmaliciousLummaC StealerBrowse
                                                          con12312211221.exeGet hashmaliciousLummaC StealerBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            steamcommunity.comfreshbodyshop.ps1Get hashmaliciousLummaC StealerBrowse
                                                            • 104.73.234.102
                                                            Clementine.exe1.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 23.197.127.21
                                                            Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 23.197.127.21
                                                            wanscam software ocx setup download.exeGet hashmaliciousUnknownBrowse
                                                            • 23.197.127.21
                                                            wanscam software ocx setup download.exeGet hashmaliciousUnknownBrowse
                                                            • 23.197.127.21
                                                            EasyWay.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 23.197.127.21
                                                            Aura.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 23.197.127.21
                                                            SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exeGet hashmaliciousLummaC Stealer, RHADAMANTHYSBrowse
                                                            • 23.204.10.89
                                                            HjBGqnNSh1.exeGet hashmaliciousUnknownBrowse
                                                            • 104.73.234.102
                                                            OjM4NF84XM.exeGet hashmaliciousAmadey, GCleaner, LummaC StealerBrowse
                                                            • 23.197.127.21
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            CLOUDFLARENETUSURGENT REQUEST FOR QUOTATION.exeGet hashmaliciousFormBookBrowse
                                                            • 104.21.18.45
                                                            https://ancollc.mrsnolas.com/Get hashmaliciousUnknownBrowse
                                                            • 1.1.1.1
                                                            https://bmra.prfortesystems.com/qlnhGet hashmaliciousUnknownBrowse
                                                            • 172.67.171.180
                                                            freshbodyshop.ps1Get hashmaliciousLummaC StealerBrowse
                                                            • 172.67.153.47
                                                            https://ancollc.mrsnolas.com/Get hashmaliciousUnknownBrowse
                                                            • 1.1.1.1
                                                            phish_alert_iocp_v1.4.48 - 2025-03-10T103931.828.emlGet hashmaliciousUnknownBrowse
                                                            • 1.1.1.1
                                                            bcmkHEAtULXzRyG.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                            • 104.21.96.1
                                                            Fw Invitation for Eligibilitytrackingcalculators to Participate in Asset Growth.msgGet hashmaliciousUnknownBrowse
                                                            • 162.159.134.42
                                                            https://159.37.167.72.host.secureserver.net/y3qAxP.z/fZCS.JH.rVzHtO2y4BZnVbFtKvgy/g9wHi5aI6E/u0_110316__;!!MxXmjrCc_Bbh!G4rdY5yTB1smRq0XPJu6HXdxwP4WDp2MhHCMkzl2DxNzYmSyd10kGpYkCXGaH4BtO2HWpAciCDX1xp7-Zjy6iC3P1iFHwR34RbG1GMvmv7sI$Get hashmaliciousUnknownBrowse
                                                            • 1.1.1.1
                                                            lalaloopy.htaGet hashmaliciousUnknownBrowse
                                                            • 172.67.173.214
                                                            AKAMAI-ASUSfreshbodyshop.ps1Get hashmaliciousLummaC StealerBrowse
                                                            • 104.73.234.102
                                                            phish_alert_iocp_v1.4.48 - 2025-03-10T103931.828.emlGet hashmaliciousUnknownBrowse
                                                            • 23.60.203.209
                                                            Fw Invitation for Eligibilitytrackingcalculators to Participate in Asset Growth.msgGet hashmaliciousUnknownBrowse
                                                            • 2.19.104.203
                                                            Online Notification.pdfGet hashmaliciousHTMLPhisherBrowse
                                                            • 92.123.17.129
                                                            Clementine.exe1.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 104.96.144.90
                                                            Orange county sheriffs office Reference Number(s)_FLD9390700107 (SOP 00900) Note(s).docxGet hashmaliciousUnknownBrowse
                                                            • 23.60.203.209
                                                            FW 188355..msgGet hashmaliciousHTMLPhisherBrowse
                                                            • 23.56.162.204
                                                            221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                                            • 23.60.203.209
                                                            mysql-installer-web-community-8.0.41.0.msiGet hashmaliciousUnknownBrowse
                                                            • 23.56.201.103
                                                            Message_3521513.emlGet hashmaliciousUnknownBrowse
                                                            • 2.16.185.191
                                                            No context
                                                            No context
                                                            No created / dropped files found
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):5.0817685288393735
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:tsles(x86).exe
                                                            File size:6'667'776 bytes
                                                            MD5:2711a173bfd3792b916ef4ca215f3d7f
                                                            SHA1:5ad347facaf2c42dcf4eb79ebe842d66689093de
                                                            SHA256:a730ada336ed4fdc37de1700299ca5ab992075e102b5a384debc71af22caba61
                                                            SHA512:0b2624740ef037fe4a685464fa553b7389f87d2201cad53494137e94aa43a8fbe47ee2c63dfc444dc72c5e6d91693223585f8a3ac843b8f5e46b3d9d314fd15c
                                                            SSDEEP:24576:r71JIvSs+/vq6i6Jj0nVLCJqI/jz7SwTkPfF6/xlZVFR9Icaug8xqErrEvDCh8ao:XESnB3aCJRv7SN0nFR9f7TvQ+JiV
                                                            TLSH:C66671E2E52F6884DAC63D3D91507ECCC435BB2207D779B8910E1E68EF542198EE5B83
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7...sz..sz..sz..b...rz..8...vz..sz..kz......rz....=.rz..szU.rz......rz..Richsz..........................PE..L...)..g...........
                                                            Icon Hash:71e8ececece8966d
                                                            Entrypoint:0x4016a0
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x67CEA929 [Mon Mar 10 08:56:09 2025 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:6
                                                            OS Version Minor:0
                                                            File Version Major:6
                                                            File Version Minor:0
                                                            Subsystem Version Major:6
                                                            Subsystem Version Minor:0
                                                            Import Hash:881753a4dd1ad9d3750a73937e0cffb0
                                                            Instruction
                                                            push ebp
                                                            mov ebp, esp
                                                            sub esp, 00000418h
                                                            call 00007FF5AC7FD847h
                                                            movzx eax, al
                                                            test eax, eax
                                                            jne 00007FF5AC7FD7E9h
                                                            mov eax, 00000001h
                                                            jmp 00007FF5AC7FD82Ch
                                                            call 00007FF5AC7FD3D4h
                                                            test eax, eax
                                                            je 00007FF5AC7FD7E9h
                                                            mov eax, 00000001h
                                                            jmp 00007FF5AC7FD81Ch
                                                            push 000001F4h
                                                            call 00007FF5AC7FDB7Fh
                                                            add esp, 04h
                                                            push 00000104h
                                                            lea ecx, dword ptr [ebp-0000020Ch]
                                                            push ecx
                                                            push 00000000h
                                                            call dword ptr [00A2803Ch]
                                                            lea edx, dword ptr [ebp-00000418h]
                                                            push edx
                                                            push 00000104h
                                                            call dword ptr [00A28004h]
                                                            call 00007FF5AC80D0C1h
                                                            xor eax, eax
                                                            mov esp, ebp
                                                            pop ebp
                                                            retn 0010h
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            push ebp
                                                            mov ebp, esp
                                                            sub esp, 38h
                                                            lea eax, dword ptr [ebp-38h]
                                                            push eax
                                                            call dword ptr [00A2802Ch]
                                                            mov ecx, dword ptr [ebp-24h]
                                                            mov dword ptr [ebp-08h], ecx
                                                            cmp dword ptr [ebp-08h], 02h
                                                            jnc 00007FF5AC7FD7FDh
                                                            push 00000010h
                                                            push 00A28068h
                                                            push 00A28084h
                                                            push 00000000h
                                                            call dword ptr [00A28060h]
                                                            xor al, al
                                                            jmp 00007FF5AC7FD8ACh
                                                            push 00A280B8h
                                                            push 00A280C8h
                                                            call dword ptr [00A28040h]
                                                            push eax
                                                            call dword ptr [00A28044h]
                                                            test eax, eax
                                                            je 00007FF5AC7FD7FDh
                                                            push 00000010h
                                                            push 00A280E4h
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x6297280x3c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x62b0000x2e170.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x65a0000x4dcc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x6282480x38.rdata
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x6280000x68.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x626f6b0x627000d9b49dacdd3da8bbcb3bad1dffe69e82unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x6280000x197a0x1a0049507f8459d1bf28ba7261bf3752cc2eFalse0.6092247596153846data6.288859556886877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x62a0000x8d00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x62b0000x2e1700x2e200f4f3873a57bd3c2befabee65eb2f834aFalse0.2763857130758808data5.858181979633841IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x65a0000x4dcc0x4e00f190454f2e9da45aaced00256dbce034False0.5056590544871795data4.627178872454414IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0x62c7700x4669PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9897919556171983
                                                            RT_ICON0x630de00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.1140275641783982
                                                            RT_ICON0x6416080x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.1959743535841917
                                                            RT_ICON0x64aab00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.2328558225508318
                                                            RT_ICON0x64ff380x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.21209258384506377
                                                            RT_ICON0x6541600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.3303941908713693
                                                            RT_ICON0x6567080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.3977485928705441
                                                            RT_ICON0x6577b00x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.5368852459016393
                                                            RT_ICON0x6581380x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.651595744680851
                                                            RT_MENU0x62b6100x440Matlab v4 mat-file (little endian) Y, numeric, rows 6946832, columns 3145842, imaginary0.5266544117647058
                                                            RT_MENU0x62ba500x1f0data0.5907258064516129
                                                            RT_MENU0x62bc400x384data0.54
                                                            RT_MENU0x62bfc80x230data0.5785714285714286
                                                            RT_DIALOG0x62c1f80x1c8data0.625
                                                            RT_DIALOG0x62c3c00xf8data0.7096774193548387
                                                            RT_DIALOG0x62c4b80x1dcdata0.6071428571428571
                                                            RT_STRING0x658ae00x90data0.75
                                                            RT_STRING0x658b700x17edata0.6518324607329843
                                                            RT_STRING0x658cf00x194data0.650990099009901
                                                            RT_STRING0x658e880x164data0.6601123595505618
                                                            RT_ACCELERATOR0x62c6980x38data0.8392857142857143
                                                            RT_ACCELERATOR0x62c6d00x30data0.8958333333333334
                                                            RT_ACCELERATOR0x62c7000x30data0.8958333333333334
                                                            RT_ACCELERATOR0x62c7300x20data1.0625
                                                            RT_ACCELERATOR0x62c7500x20data1.0625
                                                            RT_GROUP_ICON0x6585a00x84data0.7272727272727273
                                                            RT_VERSION0x6586280x4b8COM executable for DOS0.451158940397351
                                                            RT_MANIFEST0x658ff00x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                            DLLImport
                                                            KERNEL32.dllGetCommandLineA, GetTempPathW, IsDebuggerPresent, CloseHandle, GetLastError, HeapAlloc, HeapFree, GetProcessHeap, Sleep, GetCurrentProcess, GlobalMemoryStatusEx, GetSystemInfo, GetVersion, GetTickCount, FreeLibrary, GetModuleFileNameW, GetModuleHandleW, GetProcAddress, LoadLibraryW, lstrcmpiW, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW
                                                            USER32.dllMessageBoxW
                                                            DescriptionData
                                                            CommentsThis app's integration with social media platforms is incredibly useful
                                                            CompanyNameVisionary Solutions Corp Application
                                                            FileDescriptionThis program automatically syncs my calendar with all my devices making scheduling a breeze
                                                            FileVersion6.5.49.478
                                                            InternalNameProjectOptimizerApp
                                                            LegalCopyrightCopyright (C) 2013-2025 Visionary Solutions Corp Application
                                                            OriginalFilenameMediatomb.exe
                                                            ProductNameTask Manager DeLuxe
                                                            ProductVersion6.5.49.478
                                                            Translation0x0409 0x04b0
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishUnited States
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2025-03-10T19:45:33.600788+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1249704104.73.234.102443TCP
                                                            2025-03-10T19:46:59.507074+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1249692104.21.93.40443TCP
                                                            2025-03-10T19:47:31.506968+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1249703104.73.234.102443TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Mar 10, 2025 19:46:27.980341911 CET49692443192.168.2.12104.21.93.40
                                                            Mar 10, 2025 19:46:27.980395079 CET44349692104.21.93.40192.168.2.12
                                                            Mar 10, 2025 19:46:27.980602980 CET49692443192.168.2.12104.21.93.40
                                                            Mar 10, 2025 19:46:28.371059895 CET49692443192.168.2.12104.21.93.40
                                                            Mar 10, 2025 19:46:28.371082067 CET44349692104.21.93.40192.168.2.12
                                                            Mar 10, 2025 19:46:59.507074118 CET49692443192.168.2.12104.21.93.40
                                                            Mar 10, 2025 19:46:59.814770937 CET49703443192.168.2.12104.73.234.102
                                                            Mar 10, 2025 19:46:59.814814091 CET44349703104.73.234.102192.168.2.12
                                                            Mar 10, 2025 19:46:59.814990044 CET49703443192.168.2.12104.73.234.102
                                                            Mar 10, 2025 19:46:59.815279007 CET49703443192.168.2.12104.73.234.102
                                                            Mar 10, 2025 19:46:59.815294027 CET44349703104.73.234.102192.168.2.12
                                                            Mar 10, 2025 19:47:31.506968021 CET49703443192.168.2.12104.73.234.102
                                                            Mar 10, 2025 19:47:31.518258095 CET49704443192.168.2.12104.73.234.102
                                                            Mar 10, 2025 19:47:31.518296003 CET44349704104.73.234.102192.168.2.12
                                                            Mar 10, 2025 19:47:31.518366098 CET49704443192.168.2.12104.73.234.102
                                                            Mar 10, 2025 19:47:31.518718004 CET49704443192.168.2.12104.73.234.102
                                                            Mar 10, 2025 19:47:31.518733978 CET44349704104.73.234.102192.168.2.12
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Mar 10, 2025 19:46:27.812655926 CET5671953192.168.2.121.1.1.1
                                                            Mar 10, 2025 19:46:27.834613085 CET53567191.1.1.1192.168.2.12
                                                            Mar 10, 2025 19:46:59.512006044 CET5921753192.168.2.121.1.1.1
                                                            Mar 10, 2025 19:46:59.521131039 CET53592171.1.1.1192.168.2.12
                                                            Mar 10, 2025 19:46:59.522322893 CET5944753192.168.2.121.1.1.1
                                                            Mar 10, 2025 19:46:59.734828949 CET53594471.1.1.1192.168.2.12
                                                            Mar 10, 2025 19:46:59.737060070 CET5860253192.168.2.121.1.1.1
                                                            Mar 10, 2025 19:46:59.745966911 CET53586021.1.1.1192.168.2.12
                                                            Mar 10, 2025 19:46:59.748087883 CET5245353192.168.2.121.1.1.1
                                                            Mar 10, 2025 19:46:59.759300947 CET53524531.1.1.1192.168.2.12
                                                            Mar 10, 2025 19:46:59.760895014 CET5980353192.168.2.121.1.1.1
                                                            Mar 10, 2025 19:46:59.770459890 CET53598031.1.1.1192.168.2.12
                                                            Mar 10, 2025 19:46:59.771486998 CET5927253192.168.2.121.1.1.1
                                                            Mar 10, 2025 19:46:59.780951023 CET53592721.1.1.1192.168.2.12
                                                            Mar 10, 2025 19:46:59.782426119 CET5928153192.168.2.121.1.1.1
                                                            Mar 10, 2025 19:46:59.792854071 CET53592811.1.1.1192.168.2.12
                                                            Mar 10, 2025 19:46:59.794670105 CET5498453192.168.2.121.1.1.1
                                                            Mar 10, 2025 19:46:59.804078102 CET53549841.1.1.1192.168.2.12
                                                            Mar 10, 2025 19:46:59.806905985 CET6366353192.168.2.121.1.1.1
                                                            Mar 10, 2025 19:46:59.813908100 CET53636631.1.1.1192.168.2.12
                                                            Mar 10, 2025 19:47:31.509005070 CET4972253192.168.2.121.1.1.1
                                                            Mar 10, 2025 19:47:31.517380953 CET53497221.1.1.1192.168.2.12
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Mar 10, 2025 19:46:27.812655926 CET192.168.2.121.1.1.10xb114Standard query (0)tonedanswered.todayA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.512006044 CET192.168.2.121.1.1.10x22b9Standard query (0)begindecafer.worldA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.522322893 CET192.168.2.121.1.1.10x5fe2Standard query (0)garagedrootz.topA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.737060070 CET192.168.2.121.1.1.10x32efStandard query (0)modelshiverd.icuA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.748087883 CET192.168.2.121.1.1.10xfe95Standard query (0)arisechairedd.shopA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.760895014 CET192.168.2.121.1.1.10x2e56Standard query (0)catterjur.runA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.771486998 CET192.168.2.121.1.1.10xf113Standard query (0)orangemyther.liveA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.782426119 CET192.168.2.121.1.1.10x630aStandard query (0)fostinjec.todayA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.794670105 CET192.168.2.121.1.1.10xf6fdStandard query (0)sterpickced.digitalA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.806905985 CET192.168.2.121.1.1.10xb458Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:47:31.509005070 CET192.168.2.121.1.1.10xe831Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Mar 10, 2025 19:46:27.834613085 CET1.1.1.1192.168.2.120xb114No error (0)tonedanswered.today104.21.93.40A (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:27.834613085 CET1.1.1.1192.168.2.120xb114No error (0)tonedanswered.today172.67.204.101A (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.521131039 CET1.1.1.1192.168.2.120x22b9Name error (3)begindecafer.worldnonenoneA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.734828949 CET1.1.1.1192.168.2.120x5fe2Name error (3)garagedrootz.topnonenoneA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.745966911 CET1.1.1.1192.168.2.120x32efName error (3)modelshiverd.icunonenoneA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.759300947 CET1.1.1.1192.168.2.120xfe95Name error (3)arisechairedd.shopnonenoneA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.770459890 CET1.1.1.1192.168.2.120x2e56Name error (3)catterjur.runnonenoneA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.780951023 CET1.1.1.1192.168.2.120xf113Name error (3)orangemyther.livenonenoneA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.792854071 CET1.1.1.1192.168.2.120x630aName error (3)fostinjec.todaynonenoneA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.804078102 CET1.1.1.1192.168.2.120xf6fdName error (3)sterpickced.digitalnonenoneA (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:46:59.813908100 CET1.1.1.1192.168.2.120xb458No error (0)steamcommunity.com104.73.234.102A (IP address)IN (0x0001)false
                                                            Mar 10, 2025 19:47:31.517380953 CET1.1.1.1192.168.2.120xe831No error (0)steamcommunity.com104.73.234.102A (IP address)IN (0x0001)false

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:14:45:36
                                                            Start date:10/03/2025
                                                            Path:C:\Users\user\Desktop\tsles(x86).exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\tsles(x86).exe"
                                                            Imagebase:0x600000
                                                            File size:6'667'776 bytes
                                                            MD5 hash:2711A173BFD3792B916EF4CA215F3D7F
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.2470680434.00000000010DE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >