Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Cqqjbi.exe

Overview

General Information

Sample name:Cqqjbi.exe
Analysis ID:1638518
MD5:f0d8688ee72d2bda8dbc82563a9511fc
SHA1:99a2ef9db16fecaf7f07b32aa057ad612cc9d5a5
SHA256:f92b82665c20cc5e14ddef049054a1d20527ca1792257b7b55dfc8bdd1431777
Tags:exeMyPrincessAkira-Jarvasuser-JAMESWT_MHT
Infos:

Detection

Score:56
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
Joe Sandbox ML detected suspicious sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Detected non-DNS traffic on DNS port
Enables debug privileges
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Cqqjbi.exe (PID: 6712 cmdline: "C:\Users\user\Desktop\Cqqjbi.exe" MD5: F0D8688EE72D2BDA8DBC82563A9511FC)
    • WerFault.exe (PID: 3484 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6712 -s 2112 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Cqqjbi.exeVirustotal: Detection: 71%Perma Link
Source: Cqqjbi.exeReversingLabs: Detection: 68%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: Cqqjbi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 141.227.130.153:443 -> 192.168.2.6:49690 version: TLS 1.2
Source: Cqqjbi.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: \??\C:\Users\user\Desktop\Cqqjbi.PDB source: Cqqjbi.exe, 00000000.00000002.1273512955.0000000001615000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdbRSDS source: WER20AE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb.s source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Configuration.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\System.pdb source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Configuration.pdbt source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: o,C:\Windows\System.pdb source: Cqqjbi.exe, 00000000.00000002.1273117810.00000000012F9000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.pdb source: Cqqjbi.exe, 00000000.00000002.1273512955.0000000001595000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\System.pdbx{ source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Core.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb* source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER20AE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER20AE.tmp.dmp.5.dr
Source: Binary string: C:\Users\user\Desktop\Cqqjbi.PDB source: Cqqjbi.exe, 00000000.00000002.1273117810.00000000012F9000.00000004.00000010.00020000.00000000.sdmp
Source: global trafficTCP traffic: 192.168.2.6:60243 -> 162.159.36.2:53
Source: global trafficHTTP traffic detected: GET /tFbl.mp4 HTTP/1.1Host: qu.axConnection: Keep-Alive
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /tFbl.mp4 HTTP/1.1Host: qu.axConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: qu.ax
Source: global trafficDNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 14 Mar 2025 12:36:14 GMTContent-Type: text/htmlContent-Length: 427Connection: closeVary: Accept-Encoding
Source: Cqqjbi.exeString found in binary or memory: http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
Source: Cqqjbi.exeString found in binary or memory: http://managedfusion.com/)
Source: Cqqjbi.exeString found in binary or memory: http://managedfusion.com/)FManagedFusion.Rewriter.ProxyHandler
Source: Cqqjbi.exe, 00000000.00000002.1274019065.000000000332B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://qu.ax
Source: Cqqjbi.exe, 00000000.00000002.1274019065.000000000332B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://qu.axd
Source: Cqqjbi.exe, 00000000.00000002.1274019065.000000000331A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: Cqqjbi.exe, 00000000.00000002.1274019065.000000000331A000.00000004.00000800.00020000.00000000.sdmp, Cqqjbi.exe, 00000000.00000002.1274019065.0000000003326000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://qu.ax
Source: Cqqjbi.exe, 00000000.00000002.1274019065.00000000032B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://qu.ax/tFbl.mp4
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
Source: unknownHTTPS traffic detected: 141.227.130.153:443 -> 192.168.2.6:49690 version: TLS 1.2
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6712 -s 2112
Source: Cqqjbi.exe, 00000000.00000002.1273512955.000000000153E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Cqqjbi.exe
Source: Cqqjbi.exe, 00000000.00000000.1200652560.0000000000EB3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFboffzmxcqq.exe" vs Cqqjbi.exe
Source: Cqqjbi.exeBinary or memory string: OriginalFilenameFboffzmxcqq.exe" vs Cqqjbi.exe
Source: Cqqjbi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.evad.winEXE@2/6@2/1
Source: C:\Users\user\Desktop\Cqqjbi.exeMutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6712
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7941cc9e-b70f-4c13-9db8-4b8c3ce1b237Jump to behavior
Source: Cqqjbi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Cqqjbi.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\Cqqjbi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Cqqjbi.exeVirustotal: Detection: 71%
Source: Cqqjbi.exeReversingLabs: Detection: 68%
Source: Cqqjbi.exeString found in binary or memory: Setting [#] additivity to [/Adding appender named [
Source: C:\Users\user\Desktop\Cqqjbi.exeFile read: C:\Users\user\Desktop\Cqqjbi.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Cqqjbi.exe "C:\Users\user\Desktop\Cqqjbi.exe"
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6712 -s 2112
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Cqqjbi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Cqqjbi.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: \??\C:\Users\user\Desktop\Cqqjbi.PDB source: Cqqjbi.exe, 00000000.00000002.1273512955.0000000001615000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdbRSDS source: WER20AE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb.s source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Configuration.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\System.pdb source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Configuration.pdbt source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: o,C:\Windows\System.pdb source: Cqqjbi.exe, 00000000.00000002.1273117810.00000000012F9000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.pdb source: Cqqjbi.exe, 00000000.00000002.1273512955.0000000001595000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\System.pdbx{ source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Core.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb* source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER20AE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: Cqqjbi.exe, 00000000.00000002.1273512955.00000000015D2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WER20AE.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER20AE.tmp.dmp.5.dr
Source: Binary string: C:\Users\user\Desktop\Cqqjbi.PDB source: Cqqjbi.exe, 00000000.00000002.1273117810.00000000012F9000.00000004.00000010.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: Cqqjbi.exe, Program.cs.Net Code: Main System.AppDomain.Load(byte[])
Source: C:\Users\user\Desktop\Cqqjbi.exeCode function: 0_2_01510A8D push ebx; retf 0_2_01510A9A
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeMemory allocated: 1510000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeMemory allocated: 32B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeMemory allocated: 1630000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Cqqjbi.exe, 00000000.00000002.1273512955.0000000001595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeQueries volume information: C:\Users\user\Desktop\Cqqjbi.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Cqqjbi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.LOG1.5.dr, Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.LOG1.5.dr, Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.LOG1.5.dr, Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Cqqjbi.exe71%VirustotalBrowse
Cqqjbi.exe68%ReversingLabsByteCode-MSIL.Backdoor.Remcos
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://managedfusion.com/)FManagedFusion.Rewriter.ProxyHandler0%Avira URL Cloudsafe
http://qu.axd0%Avira URL Cloudsafe
http://managedfusion.com/)0%Avira URL Cloudsafe
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
qu.ax
141.227.130.153
truefalse
    high
    241.42.69.40.in-addr.arpa
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://qu.ax/tFbl.mp4false
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://qu.axCqqjbi.exe, 00000000.00000002.1274019065.000000000332B000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://logging.apache.org/log4net/release/faq.html#trouble-EventLogCqqjbi.exefalse
          • Avira URL Cloud: safe
          unknown
          http://qu.axdCqqjbi.exe, 00000000.00000002.1274019065.000000000332B000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://upx.sf.netAmcache.hve.5.drfalse
            high
            http://managedfusion.com/)Cqqjbi.exefalse
            • Avira URL Cloud: safe
            unknown
            https://qu.axCqqjbi.exe, 00000000.00000002.1274019065.000000000331A000.00000004.00000800.00020000.00000000.sdmp, Cqqjbi.exe, 00000000.00000002.1274019065.0000000003326000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://managedfusion.com/)FManagedFusion.Rewriter.ProxyHandlerCqqjbi.exefalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCqqjbi.exe, 00000000.00000002.1274019065.000000000331A000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                141.227.130.153
                qu.axFrance
                21070TOTALFRfalse
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1638518
                Start date and time:2025-03-14 13:35:19 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 37s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:16
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:Cqqjbi.exe
                Detection:MAL
                Classification:mal56.evad.winEXE@2/6@2/1
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 2
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 40.69.146.102, 20.190.159.73, 23.199.214.10, 4.175.87.197, 40.69.42.241, 20.109.210.53
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobvmssprdcus04.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target Cqqjbi.exe, PID 6712 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Report size getting too big, too many NtSetInformationFile calls found.
                TimeTypeDescription
                08:36:19API Interceptor1x Sleep call for process: WerFault.exe modified
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                qu.axbdc2be5bddda548dec3c2d88464a698627ac9447aae621d8.exeGet hashmaliciousLummaC StealerBrowse
                • 57.129.55.84
                striped.exeGet hashmaliciousLummaC StealerBrowse
                • 141.227.168.109
                wanscam software ocx setup download.exeGet hashmaliciousLummaC StealerBrowse
                • 141.227.168.109
                install.zipGet hashmaliciousLummaC StealerBrowse
                • 57.129.55.84
                bdc2be5bddda548dec3c2d88464a698627ac9447aae621d8.wks.ps1Get hashmaliciousLummaC StealerBrowse
                • 141.227.168.109
                363a65f9349561edd0d29c63e78009f4.exeGet hashmaliciousLummaC StealerBrowse
                • 157.180.25.161
                363a65f9349561edd0d29c63e78009f4.bin.exeGet hashmaliciousLummaC StealerBrowse
                • 141.227.168.109
                chimera tool license crack 240.7zGet hashmaliciousLummaC StealerBrowse
                • 57.129.55.84
                sample.exeGet hashmaliciousLummaC StealerBrowse
                • 157.180.18.177
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                TOTALFRjaws.elfGet hashmaliciousUnknownBrowse
                • 141.227.167.208
                yakov.spc.elfGet hashmaliciousMiraiBrowse
                • 141.227.57.36
                yakov.sh4.elfGet hashmaliciousMiraiBrowse
                • 141.227.120.246
                striped.exeGet hashmaliciousLummaC StealerBrowse
                • 141.227.168.109
                wanscam software ocx setup download.exeGet hashmaliciousLummaC StealerBrowse
                • 141.227.168.109
                bdc2be5bddda548dec3c2d88464a698627ac9447aae621d8.wks.ps1Get hashmaliciousLummaC StealerBrowse
                • 141.227.168.109
                363a65f9349561edd0d29c63e78009f4.bin.exeGet hashmaliciousLummaC StealerBrowse
                • 141.227.168.109
                Setup.exeGet hashmaliciousLummaC StealerBrowse
                • 141.227.138.144
                772a09d8ce7f9f4da9fc0087f1cf84f12aedb2e2cfbf9989.bin.ps1Get hashmaliciousLummaC StealerBrowse
                • 141.227.168.109
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.W32.Lolbas.A.tr.11988.23512.exeGet hashmaliciousScreenConnect ToolBrowse
                • 141.227.130.153
                SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeGet hashmaliciousScreenConnect ToolBrowse
                • 141.227.130.153
                SecuriteInfo.com.W32.Lolbas.A.tr.11988.23512.exeGet hashmaliciousScreenConnect ToolBrowse
                • 141.227.130.153
                NursultanClient.exe1.exeGet hashmaliciousUnknownBrowse
                • 141.227.130.153
                SecuriteInfo.com.W32.Lolbas.A.tr.14514.3.exeGet hashmaliciousScreenConnect ToolBrowse
                • 141.227.130.153
                NursultanClient.exe1.exeGet hashmaliciousUnknownBrowse
                • 141.227.130.153
                Client-built.exeGet hashmaliciousDiscord RatBrowse
                • 141.227.130.153
                SecuriteInfo.com.W32.Lolbas.A.tr.29609.16284.exeGet hashmaliciousScreenConnect ToolBrowse
                • 141.227.130.153
                Client-built.exeGet hashmaliciousDiscord RatBrowse
                • 141.227.130.153
                SecuriteInfo.com.W32.Lolbas.A.tr.14514.3.exeGet hashmaliciousScreenConnect ToolBrowse
                • 141.227.130.153
                No context
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):1.1560666984155201
                Encrypted:false
                SSDEEP:96:w7FnlxWH6Q9UUyxZnYQXIDcQvc6QcEVcw3cE/X+BHUHZ0ownOgHkEwH3dEFYAKcF:iXxWaf0BU/aauseLyIZzuiFuZ24IO83
                MD5:D91468A883E9B9F3A0032BD8916D2F6C
                SHA1:A286039CE28F665BFD0268961B9C39BDB6C06EF3
                SHA-256:226669744B9134FF06ECE524A3953125EC2BDA10D4332C90B55A64DA6BE3E928
                SHA-512:A23FE30546EAA0AD16A2D1C81E3C380EFBAF16A93345583395C890D4CADE2C5DD04098E4CEC3A37E5D4CFBB32DCB3041B2E33E4E0272D5451B824A997EBC693B
                Malicious:true
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.6.4.2.9.3.7.5.8.3.9.3.8.6.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.6.4.2.9.3.7.6.7.3.0.0.0.2.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.1.8.0.f.9.6.5.-.2.a.9.5.-.4.6.4.b.-.b.4.4.0.-.0.c.4.9.0.3.8.d.6.6.a.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.5.a.2.f.f.5.a.-.f.0.9.2.-.4.d.9.3.-.a.e.d.2.-.5.0.b.c.a.2.3.f.e.a.2.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.C.q.q.j.b.i...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.F.b.o.f.f.z.m.x.c.q.q...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.8.-.0.0.0.1.-.0.0.1.9.-.1.e.0.9.-.4.0.a.b.d.d.9.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.b.c.4.e.3.3.d.f.a.4.e.5.e.3.a.e.e.b.6.4.c.5.4.9.d.2.e.0.3.a.d.0.0.0.0.0.0.0.0.!.0.0.0.0.9.9.a.2.e.f.9.d.b.1.6.f.e.c.a.f.7.f.0.7.b.3.2.a.a.0.5.7.a.d.6.1.2.c.c.9.d.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Fri Mar 14 12:36:16 2025, 0x1205a4 type
                Category:dropped
                Size (bytes):264420
                Entropy (8bit):3.791339078088306
                Encrypted:false
                SSDEEP:3072:Y5WSt+WwUc4uEqDyZb1nNLTgwjDs6tzguvPwxGPcGVL:Y5uUc4qyZ/TgizguvbL
                MD5:C40DF3504CF271C5A6DE54D582278E2B
                SHA1:E88D72DAA5C7530CC1ED5A22ECD5C6FF9272ED83
                SHA-256:97358E47EA219C67E4D9DE5F96C2B415F7E477701E85A9C077168BF8BE630022
                SHA-512:15A57675D7575B29C4683CCCCEE287AB0B122E841E0855535FF5C0BC3EEB5F490CFF2C3533D7F55717C97DE26998868AAFC9799098277F8F09D21FAEBF566B45
                Malicious:false
                Reputation:low
                Preview:MDMP..a..... ........".g............t.......................<....'......."...Y..........`.......8...........T............R..T...........P'..........<)..............................................................................eJ.......)......GenuineIntel............T.......8....".g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8374
                Entropy (8bit):3.696595593630614
                Encrypted:false
                SSDEEP:192:R6l7wVeJRR6o6YZSSU94zgmfZYLprh89bICsf34m:R6lXJH6o6Y8SU94zgmfi4IBft
                MD5:B0F98C90A5DFD2D1499201E13E1E9D23
                SHA1:FEED866D5C81D63240DBCB6F16F79510274938F9
                SHA-256:2E1B783203357D17961CBC74B7F0366C40E5A5D0A235CE945BFE89C4C7E93E9D
                SHA-512:092DEC79B5662B6F53FBB9DFF5C1B7BC3CA340007163D72EBFE9E5CC0D02BD0C8446F338AC90B098FE0DC51950BEC4598B1FAAAF3BFCBAE8622DA61EDE6DE0DA
                Malicious:false
                Reputation:low
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.2.<./.P.i.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4730
                Entropy (8bit):4.45775559884092
                Encrypted:false
                SSDEEP:48:cvIwWl8zsPJg77aI9EnWpW8VYyYm8M4Jxhx3FO/1+q8v3xTHqR4d:uIjfxI7CW7VCJxh+/1K3pHqR4d
                MD5:90001A7F39C078A017BFF755B81AC07B
                SHA1:53AB89DC547EEEEBA7EA4CBF6A87EBA2C122CB54
                SHA-256:61AF1C96CCED33BD2E2FF36DA83F11ACD7086B92C6E834AB31AC2E2508A1FB9F
                SHA-512:D573461889D809FD98FFA10EDA67B137099761EF817C3EDC8FD6C98BDBE24AF4FB3A16BC4285D57469B709FAD47FBB6112A8A2CC8A91915EB9AD35A77D0F900F
                Malicious:false
                Reputation:low
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="760538" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.473381262158973
                Encrypted:false
                SSDEEP:6144:39Zfpi6ceLPx9skLmb0fjZWSP3aJG8nAge03BQqZaKFFIeC/DNcXrtdLrI:tZHtjZWOcxQqYzrubtC
                MD5:E00F181949A3162CDD0B2A3093AD914A
                SHA1:CFEB512BD020B70454350B6CA4196787E4D2598F
                SHA-256:05F6CBB6DCA9FEEE28EB8DEA0A0B3731524AB424C3DBBED03F0B820060F07FFF
                SHA-512:37BCF783C5373039907D04ED968D14B75226D15C92631452860980F2088AB6CB89F389BD92458DD000312D54101C5EBB87B2A3FD8645F35062956B28A0EE1C9D
                Malicious:false
                Reputation:low
                Preview:regfL...L....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..[.d...............................................................................................................................................................................................................................................................................................................................................|.M ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):2.7850859305892643
                Encrypted:false
                SSDEEP:768:ygpDoUrPjyutmUu/mR7K4dxI7Bdb8lvdzsIO2qlo2ysUeq9N:ygMuMUu+/r4rAlVIom
                MD5:9A395CD67343C71A2C37BF8D3EA445A1
                SHA1:4C078B0447B1D5360972546C283BF7402F3C75D2
                SHA-256:9553E8A1DA8D6AF07D8529C31C116CFF23418AC5F79B730D0908ED19708B26D9
                SHA-512:8F0902C507A11E4024C5EA60F5802206542AB1D3031C6B73C8915FE9B0C4C811CAE16D5BE45A1D0EE45BC5CFB2B088E6D91F53E778D8CABFB4386C87BBB5ABB5
                Malicious:false
                Reputation:low
                Preview:regfK...K....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..[.d...............................................................................................................................................................................................................................................................................................................................................z.M HvLE........K............lx.V.............................................. ....... ..hbin.................\.Z............nk,..\.Z....................h...................................<.......&...{11517B7C-E79D-4e20-961B-75A811715ADD}..`...sk..........^...........\...l.............H.........?...................?...................?........... ... ........... ... ...................$.N..........vk..4...`...........CreatingCommand.....O.n.e.D.r.i.v.e.S.e.t.u.p...e.x.e. ./.s.i.l.
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):5.621637181348703
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:Cqqjbi.exe
                File size:426'496 bytes
                MD5:f0d8688ee72d2bda8dbc82563a9511fc
                SHA1:99a2ef9db16fecaf7f07b32aa057ad612cc9d5a5
                SHA256:f92b82665c20cc5e14ddef049054a1d20527ca1792257b7b55dfc8bdd1431777
                SHA512:074ca9c6cf7eb4e7a0cd1fd89f8d0f902fa4e648d2de19dac3a158121194704ae33f390bfb2bff8cc20072dead667ea591db343e2678ba91e2e05c020b2e1a37
                SSDEEP:3072:f5RZ0+rDnojLQehENzR/eWlw/TH+zDinbs4hnwILH0k2n7GD/tkZVF1D9G9qqCgk:f51DCQeSNzxtMSKUpqCAgGncXX/
                TLSH:96942A907BF49627F6EFA3B6A0B144100AB4F88AF47ADB5E0D9470DE1C637449901B7B
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......e............................R.... ........@.. ....................................`................................
                Icon Hash:0c17627cb1130347
                Entrypoint:0x45da52
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x65CC1F81 [Wed Feb 14 02:03:45 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [0045DA60h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                xor al, DAh
                add eax, 00000000h
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x5da040x4c.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x5e0000xc1ba.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x6c0000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x5da600x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x5ba680x5bc009f2cf3234414c487f0c35cfa2a448080False0.3749201720027248data5.776649616575154IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x5e0000xc1ba0xc2001bcd51c38b879ad9ae9933dd48f47bc9False0.16782780283505155data3.306356157033186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x6c0000xc0x200dd1e2ebcc8ef42a1155e68776c962f1dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0x5e1e00x126ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8736752861381941
                RT_ICON0x5f45e0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 00.05892772791686349
                RT_ICON0x636960x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.07354771784232365
                RT_ICON0x65c4e0x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 00.09571005917159764
                RT_ICON0x676c60x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.11045966228893059
                RT_ICON0x6877e0x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.14918032786885246
                RT_ICON0x691160x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 00.18372093023255814
                RT_ICON0x697de0x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.2801418439716312
                RT_GROUP_ICON0x69c560x76data0.7457627118644068
                RT_VERSION0x69cdc0x2e4data0.43108108108108106
                RT_MANIFEST0x69fd00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                DLLImport
                mscoree.dll_CorExeMain
                DescriptionData
                Translation0x0000 0x04b0
                Comments
                CompanyName
                FileDescription
                FileVersion1.0.0.0
                InternalNameFboffzmxcqq.exe
                LegalCopyright
                LegalTrademarks
                OriginalFilenameFboffzmxcqq.exe
                ProductName
                ProductVersion1.0.0.0
                Assembly Version1.0.0.0
                TimestampSource PortDest PortSource IPDest IP
                Mar 14, 2025 13:36:13.224957943 CET49690443192.168.2.6141.227.130.153
                Mar 14, 2025 13:36:13.224988937 CET44349690141.227.130.153192.168.2.6
                Mar 14, 2025 13:36:13.225076914 CET49690443192.168.2.6141.227.130.153
                Mar 14, 2025 13:36:13.391762018 CET49690443192.168.2.6141.227.130.153
                Mar 14, 2025 13:36:13.391789913 CET44349690141.227.130.153192.168.2.6
                Mar 14, 2025 13:36:14.115303040 CET44349690141.227.130.153192.168.2.6
                Mar 14, 2025 13:36:14.115417004 CET49690443192.168.2.6141.227.130.153
                Mar 14, 2025 13:36:14.123483896 CET49690443192.168.2.6141.227.130.153
                Mar 14, 2025 13:36:14.123496056 CET44349690141.227.130.153192.168.2.6
                Mar 14, 2025 13:36:14.123898029 CET44349690141.227.130.153192.168.2.6
                Mar 14, 2025 13:36:14.179029942 CET49690443192.168.2.6141.227.130.153
                Mar 14, 2025 13:36:14.231507063 CET49690443192.168.2.6141.227.130.153
                Mar 14, 2025 13:36:14.272336960 CET44349690141.227.130.153192.168.2.6
                Mar 14, 2025 13:36:14.453927994 CET44349690141.227.130.153192.168.2.6
                Mar 14, 2025 13:36:14.454005003 CET44349690141.227.130.153192.168.2.6
                Mar 14, 2025 13:36:14.454205036 CET49690443192.168.2.6141.227.130.153
                Mar 14, 2025 13:36:14.566584110 CET49690443192.168.2.6141.227.130.153
                Mar 14, 2025 13:36:45.514475107 CET6024353192.168.2.6162.159.36.2
                Mar 14, 2025 13:36:45.519134045 CET5360243162.159.36.2192.168.2.6
                Mar 14, 2025 13:36:45.519254923 CET6024353192.168.2.6162.159.36.2
                Mar 14, 2025 13:36:45.524209023 CET5360243162.159.36.2192.168.2.6
                Mar 14, 2025 13:36:46.190531015 CET6024353192.168.2.6162.159.36.2
                Mar 14, 2025 13:36:46.195451975 CET5360243162.159.36.2192.168.2.6
                Mar 14, 2025 13:36:46.195497036 CET6024353192.168.2.6162.159.36.2
                TimestampSource PortDest PortSource IPDest IP
                Mar 14, 2025 13:36:13.213232994 CET6300153192.168.2.61.1.1.1
                Mar 14, 2025 13:36:13.220282078 CET53630011.1.1.1192.168.2.6
                Mar 14, 2025 13:36:45.513976097 CET5357243162.159.36.2192.168.2.6
                Mar 14, 2025 13:36:46.215224981 CET5374553192.168.2.61.1.1.1
                Mar 14, 2025 13:36:46.222625971 CET53537451.1.1.1192.168.2.6
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Mar 14, 2025 13:36:13.213232994 CET192.168.2.61.1.1.10x433Standard query (0)qu.axA (IP address)IN (0x0001)false
                Mar 14, 2025 13:36:46.215224981 CET192.168.2.61.1.1.10xfa8aStandard query (0)241.42.69.40.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Mar 14, 2025 13:36:13.220282078 CET1.1.1.1192.168.2.60x433No error (0)qu.ax141.227.130.153A (IP address)IN (0x0001)false
                Mar 14, 2025 13:36:13.220282078 CET1.1.1.1192.168.2.60x433No error (0)qu.ax37.27.201.137A (IP address)IN (0x0001)false
                Mar 14, 2025 13:36:13.220282078 CET1.1.1.1192.168.2.60x433No error (0)qu.ax141.227.160.60A (IP address)IN (0x0001)false
                Mar 14, 2025 13:36:46.222625971 CET1.1.1.1192.168.2.60xfa8aName error (3)241.42.69.40.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                • qu.ax
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.649690141.227.130.1534436712C:\Users\user\Desktop\Cqqjbi.exe
                TimestampBytes transferredDirectionData
                2025-03-14 12:36:14 UTC63OUTGET /tFbl.mp4 HTTP/1.1
                Host: qu.ax
                Connection: Keep-Alive
                2025-03-14 12:36:14 UTC166INHTTP/1.1 404 Not Found
                Server: nginx
                Date: Fri, 14 Mar 2025 12:36:14 GMT
                Content-Type: text/html
                Content-Length: 427
                Connection: close
                Vary: Accept-Encoding
                2025-03-14 12:36:14 UTC427INData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 71 75 2e 61 78 20 7c 20 34 30 34 20 4e 6f 74 20 66 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 61 74 69 63 2f 34 30 34 2e 63 73 73 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 20 68 72 65 66 3d 22 2f 66 61 76 69 63 6f 6e 2e 69 63 6f 22 20 2f 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 64 69 76 20 69 64 3d 22 74 73 70 61 72 74 69 63 6c 65 73 22 3e 3c 2f 64 69 76 3e 0a 20 20
                Data Ascii: <!doctype html><html lang="en"> <head> <title>qu.ax | 404 Not found</title> <link rel="stylesheet" href="/static/404.css" /> <link rel="icon" type="image/x-icon" href="/favicon.ico" /> </head> <body> <div id="tsparticles"></div>


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:08:36:11
                Start date:14/03/2025
                Path:C:\Users\user\Desktop\Cqqjbi.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\Cqqjbi.exe"
                Imagebase:0xe50000
                File size:426'496 bytes
                MD5 hash:F0D8688EE72D2BDA8DBC82563A9511FC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:5
                Start time:08:36:15
                Start date:14/03/2025
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6712 -s 2112
                Imagebase:0x3b0000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >
                  Memory Dump Source
                  • Source File: 00000000.00000002.1273477056.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1510000_Cqqjbi.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5dff73809e3ba2698dbf8a86a0e91edb62d09870b511a85141c556f1485696ec
                  • Instruction ID: a07e72cda310221069e32d912ef2e483c56cc684bf6087faf47d2a588f479d24
                  • Opcode Fuzzy Hash: 5dff73809e3ba2698dbf8a86a0e91edb62d09870b511a85141c556f1485696ec
                  • Instruction Fuzzy Hash: 6831D231700211CFEB14EB78C45869DB7E2BF88720F2485A8E956AF3E8EB319C45C790
                  Memory Dump Source
                  • Source File: 00000000.00000002.1273477056.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1510000_Cqqjbi.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9e7d5d97b374053aa9ee886639633509854dd5f0a59e13c0f29b91c908ca2f11
                  • Instruction ID: 4101683a686d1d05485e5fdc4965da26c974bc3f3f85b0ac4d8ab59bc0c53abd
                  • Opcode Fuzzy Hash: 9e7d5d97b374053aa9ee886639633509854dd5f0a59e13c0f29b91c908ca2f11
                  • Instruction Fuzzy Hash: 2D31C035700214CFEB14EA78C45865D77E2BF88710F2445A8E952AB3E8EB31AC45C7D0