Loading ...

Play interactive tourEdit tour

Windows Analysis Report 3fVvJyTvQU

Overview

General Information

Sample Name:3fVvJyTvQU (renamed file extension from none to exe)
Analysis ID:458975
MD5:4003498f5c38cf05a71125d4e8745791
SHA1:5bf2e49a13c64f3f65c0b8ef8a61f8202cde5359
SHA256:ad5711a5bdcd7c6334389a2ed722e16e774d8f55737e85f57c71ec3e1767c63b
Tags:32exetrojan
Infos:

Most interesting Screenshot:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Creates processes via WMI
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • 3fVvJyTvQU.exe (PID: 5440 cmdline: 'C:\Users\user\Desktop\3fVvJyTvQU.exe' MD5: 4003498F5C38CF05A71125D4E8745791)
    • conhost.exe (PID: 6128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • 3fVvJyTvQU.exe (PID: 5956 cmdline: 'C:\Users\user\Desktop\3fVvJyTvQU.exe' -a MD5: 4003498F5C38CF05A71125D4E8745791)
      • conhost.exe (PID: 5300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for domain / URLShow sources
Source: google.vrthcobj.comVirustotal: Detection: 7%Perma Link
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\AppData\Local\Temp\sqlite.dllVirustotal: Detection: 13%Perma Link
Multi AV Scanner detection for submitted fileShow sources
Source: 3fVvJyTvQU.exeVirustotal: Detection: 31%Perma Link
Source: 3fVvJyTvQU.exeReversingLabs: Detection: 48%
Source: 3fVvJyTvQU.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: unknownHTTPS traffic detected: 172.67.146.70:443 -> 192.168.2.3:49712 version: TLS 1.2
Source: Binary string: D:\Administrator\Desktop\Qt5\Release\Qt5WebSockets.pdb source: 3fVvJyTvQU.exe, 00000003.00000003.214893639.0000000000640000.00000004.00000001.sdmp, sqlite.dll.3.dr

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
Source: TrafficSnort IDS: 1948 DNS zone transfer UDP 192.168.2.3:57569 -> 34.97.69.225:53
Source: Joe Sandbox ViewIP Address: 172.67.146.70 172.67.146.70
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknownDNS traffic detected: queries for: a.goatgame.co
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownHTTPS traffic detected: 172.67.146.70:443 -> 192.168.2.3:49712 version: TLS 1.2
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeCode function: 0_2_004048ED
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\sqlite.dll 7250A8A1B98D09BE823CD6EFD30D85E5418DFC3541D220BB0694DFCC547478BD
Source: 3fVvJyTvQU.exe, 00000000.00000000.199853055.000000000040E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLicenseHelper.exe> vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exe, 00000000.00000002.203152076.0000000002300000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exe, 00000000.00000002.203209704.0000000002360000.00000002.00000001.sdmpBinary or memory string: originalfilename vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exe, 00000000.00000002.203209704.0000000002360000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exe, 00000003.00000002.216402889.000000000040E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLicenseHelper.exe> vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exe, 00000003.00000002.216710496.00000000021D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewinhttp.dll.muij% vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exe, 00000003.00000003.214893639.0000000000640000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameQt5Gui.dll( vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exe, 00000003.00000002.216651961.0000000002080000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dllj% vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exe, 00000003.00000002.216658689.0000000002090000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exe, 00000003.00000002.216698116.00000000021B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exe, 00000003.00000002.216702455.00000000021C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exeBinary or memory string: OriginalFilenameLicenseHelper.exe> vs 3fVvJyTvQU.exe
Source: 3fVvJyTvQU.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engineClassification label: mal76.winEXE@5/2@3/1
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeCode function: 0_2_00401050 lstrcatW,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,SysAllocString,SysAllocString,SysAllocString,SysAllocString,lstrlenW,lstrlenW,VariantClear,VariantClear,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,VariantClear,VariantClear,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5300:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6128:120:WilError_01
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeFile created: C:\Users\user\AppData\Local\Temp\sqlite.datJump to behavior
Source: 3fVvJyTvQU.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: 3fVvJyTvQU.exeVirustotal: Detection: 31%
Source: 3fVvJyTvQU.exeReversingLabs: Detection: 48%
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeFile read: C:\Users\user\Desktop\3fVvJyTvQU.exe:Zone.IdentifierJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\3fVvJyTvQU.exe 'C:\Users\user\Desktop\3fVvJyTvQU.exe'
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeProcess created: C:\Users\user\Desktop\3fVvJyTvQU.exe 'C:\Users\user\Desktop\3fVvJyTvQU.exe' -a
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeProcess created: C:\Users\user\Desktop\3fVvJyTvQU.exe 'C:\Users\user\Desktop\3fVvJyTvQU.exe' -a
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
Source: Binary string: D:\Administrator\Desktop\Qt5\Release\Qt5WebSockets.pdb source: 3fVvJyTvQU.exe, 00000003.00000003.214893639.0000000000640000.00000004.00000001.sdmp, sqlite.dll.3.dr
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeCode function: 0_2_004018A0 LoadLibraryA,GetProcAddress,ShellExecuteExW,
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeCode function: 0_2_00406590 push eax; ret

Persistence and Installation Behavior:

barindex
Creates processes via WMIShow sources
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeFile created: C:\Users\user\AppData\Local\Temp\sqlite.dllJump to dropped file
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\sqlite.dllJump to dropped file
Source: C:\Users\user\Desktop\3fVvJyTvQU.exe TID: 5328Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\3fVvJyTvQU.exe TID: 5888Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeCode function: 0_2_004018A0 LoadLibraryA,GetProcAddress,ShellExecuteExW,
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeCode function: 0_2_004053C2 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeCode function: 0_2_004053B0 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeProcess created: C:\Users\user\Desktop\3fVvJyTvQU.exe 'C:\Users\user\Desktop\3fVvJyTvQU.exe' -a
Source: C:\Users\user\Desktop\3fVvJyTvQU.exeCode function: 0_2_0040267E EntryPoint,GetVersion,GetCommandLineA,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation11Path InterceptionProcess Injection11Virtualization/Sandbox Evasion1OS Credential DumpingSecurity Software Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection11LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery3Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
3fVvJyTvQU.exe32%VirustotalBrowse
3fVvJyTvQU.exe48%ReversingLabsWin32.Trojan.Sabsik

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\sqlite.dll14%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\sqlite.dll15%ReversingLabsWin32.Trojan.Generic

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
google.vrthcobj.com8%VirustotalBrowse
a.goatgame.co2%VirustotalBrowse

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
google.vrthcobj.com
34.97.69.225
truetrueunknown
a.goatgame.co
172.67.146.70
truefalseunknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
172.67.146.70
a.goatgame.coUnited States
13335CLOUDFLARENETUSfalse

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:458975
Start date:03.08.2021
Start time:23:41:18
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 59s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:3fVvJyTvQU (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:24
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal76.winEXE@5/2@3/1
EGA Information:Failed
HDC Information:
  • Successful, ratio: 100% (good quality ratio 93.6%)
  • Quality average: 79.3%
  • Quality standard deviation: 29%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, rundll32.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, svchost.exe
  • TCP Packets have been reduced to 100
  • Excluded IPs from analysis (whitelisted): 104.43.139.144, 40.88.32.150
  • Excluded domains from analysis (whitelisted): skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolcus16.cloudapp.net, watson.telemetry.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.

Simulations

Behavior and APIs

TimeTypeDescription
23:42:11API Interceptor4x Sleep call for process: 3fVvJyTvQU.exe modified

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
172.67.146.70TMB1fxNaqR.exeGet hashmaliciousBrowse
    LRios3pM39.exeGet hashmaliciousBrowse
      85d8c.exeGet hashmaliciousBrowse
        QfVER41Fwx.exeGet hashmaliciousBrowse
          O3h9kRdG7d.exeGet hashmaliciousBrowse
            1A263B2603212FF1E492D9E0C718F12601789E27EAABA.exeGet hashmaliciousBrowse
              U7HCBc2SVy.exeGet hashmaliciousBrowse
                76xAf6BYg8.exeGet hashmaliciousBrowse
                  E4lwAiXNCE.exeGet hashmaliciousBrowse
                    pLF8TJmHlD.exeGet hashmaliciousBrowse

                      Domains

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      google.vrthcobj.comTMB1fxNaqR.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      LRios3pM39.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      85d8c.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      QfVER41Fwx.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      93ejLcdBh5.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      k2VFD3gNGE.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      MIN56KgzBN.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      U7HCBc2SVy.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      TIoFSlDlv6.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      76xAf6BYg8.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      E4lwAiXNCE.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      pLF8TJmHlD.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      sonia_6.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      5H4iRfY1ek.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      Copy.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      pMVkvSyeIy.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      w7pR0EOMwd.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      BoLQVCmIZB.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      DhWFvSKvSb.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      U2HHCJvDj4.exeGet hashmaliciousBrowse
                      • 34.97.69.225
                      a.goatgame.coTMB1fxNaqR.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      LRios3pM39.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      85d8c.exeGet hashmaliciousBrowse
                      • 104.21.79.144
                      85d8c.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      QfVER41Fwx.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      O3h9kRdG7d.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      puzlXYxqKK.exeGet hashmaliciousBrowse
                      • 104.21.79.144
                      k2VFD3gNGE.exeGet hashmaliciousBrowse
                      • 104.21.79.144
                      MIN56KgzBN.exeGet hashmaliciousBrowse
                      • 104.21.79.144
                      U7HCBc2SVy.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      TIoFSlDlv6.exeGet hashmaliciousBrowse
                      • 104.21.79.144
                      76xAf6BYg8.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      E4lwAiXNCE.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      pLF8TJmHlD.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      sonia_6.exeGet hashmaliciousBrowse
                      • 104.21.79.144

                      ASN

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      CLOUDFLARENETUSTMB1fxNaqR.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      LRios3pM39.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      State Settlement Copy.htmlGet hashmaliciousBrowse
                      • 172.67.75.3
                      Request Quotation.exeGet hashmaliciousBrowse
                      • 172.67.188.154
                      invoice.vbsGet hashmaliciousBrowse
                      • 162.159.130.233
                      kKZZ0J8y0c.exeGet hashmaliciousBrowse
                      • 104.21.19.200
                      RFQ 29.exeGet hashmaliciousBrowse
                      • 104.21.19.200
                      ATT80307.HTMGet hashmaliciousBrowse
                      • 104.16.19.94
                      2C.TA9.HTMLGet hashmaliciousBrowse
                      • 104.18.11.207
                      Dosusign_Na_Sign.htmGet hashmaliciousBrowse
                      • 172.67.145.176
                      RoyalMail_Requestform0729.exeGet hashmaliciousBrowse
                      • 172.67.188.154
                      sbcss_Richard.DeNava_#inv0549387TWQYqzTPaYeqvaYMnpdIfJAwwzbguzauViQVRRplvOktNmAire.HTMGet hashmaliciousBrowse
                      • 104.16.18.94
                      Fake.HTMGet hashmaliciousBrowse
                      • 104.16.19.94
                      RoyalMail_Requestform1.exeGet hashmaliciousBrowse
                      • 172.67.188.154
                      Nouveau bon de commande. 3007021_pdf.exeGet hashmaliciousBrowse
                      • 23.227.38.74
                      MFS0175, MFS0117 MFS0194.exeGet hashmaliciousBrowse
                      • 172.67.188.154
                      ORIGINAL PROFORMA INVOICE COAU7220898130,PDF.exeGet hashmaliciousBrowse
                      • 172.67.176.89
                      Purchase Requirements.exeGet hashmaliciousBrowse
                      • 23.227.38.74
                      items.docGet hashmaliciousBrowse
                      • 104.21.19.200
                      ZI09484474344.exeGet hashmaliciousBrowse
                      • 104.21.49.41

                      JA3 Fingerprints

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      ce5f3254611a8c095a3d821d44539877TMB1fxNaqR.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      LRios3pM39.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      24um7vU1BD.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      JQ2bNBDOcO.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      Dpwipnj1gx.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      19G1ZLyqr2.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      ULylDR5F36.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      SecuriteInfo.com.W32.AIDetect.malware2.26285.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      banload.msiGet hashmaliciousBrowse
                      • 172.67.146.70
                      yQShMhZ7Hi.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      zW4oE2ASRB.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      run.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      RNrtE1qOSL.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      hDJzf1oo7U.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      hpDcwMoScr.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      JGJtVyC9dr.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      QqcQ1EteWS.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      Ya50avl5OT.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      8xCetBLoAt.exeGet hashmaliciousBrowse
                      • 172.67.146.70
                      7xt9iOfzN2.exeGet hashmaliciousBrowse
                      • 172.67.146.70

                      Dropped Files

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      C:\Users\user\AppData\Local\Temp\sqlite.dllTMB1fxNaqR.exeGet hashmaliciousBrowse
                        LRios3pM39.exeGet hashmaliciousBrowse
                          CyLELjM5zk.exeGet hashmaliciousBrowse
                            setup_x86_x64_install.exeGet hashmaliciousBrowse

                              Created / dropped Files

                              C:\Users\user\AppData\Local\Temp\sqlite.dat
                              Process:C:\Users\user\Desktop\3fVvJyTvQU.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):578665
                              Entropy (8bit):7.9654519561375405
                              Encrypted:false
                              SSDEEP:12288:811ticqWIMMXa2ad3KNj8++VUYgokNxcg8aVg1gKtY7SQ0O:YPeBaRKNjdklalbVygKtY7xX
                              MD5:9AB1B7EC387DAE76B10ADE9CEE9F7E16
                              SHA1:C88CE8EF04C2A34890F91D2A908053C56FE49349
                              SHA-256:90C8B4423A96315412C7B28E242F8A83B2F805DE631B4F852621EA73BA11C42E
                              SHA-512:8EAF5E21F3150884101636B04DA11DCDD1009B321D0E858B382012362F538B8D43FC56AC7EF06CA40B44DA809E7D294C1812200A3FB7231AE1ED07494E6E6A8A
                              Malicious:false
                              Reputation:low
                              Preview: .<..Hh.j...?...O}3..8v,)cml.T/.....V.r.....n.?y..oz#V......N.{.....!....Y."..)v.T.........Ub.V..*.)..8..,.%.{4.yWrA.a36&..,...V...l9.y....39.y...wW.j.ox.....I..;..%..p.b..>..j.....j..awT..r...j....o./.7...,=uk..i../h..j*j.P.j..?.-X.k..R}.j.5.b-F.k..c........j...j..Q?...).qe......,o'k.....j.J..))O.......k..\.....u,..k...,..k....k...tOT.X.jXe-.k..7.k...83U.......%..o.....Y%.....7.F.(j...KP..I..j..y...o..no......z......u/..DJP.e+.Dj..Z....k.......j$T.X.j[..`....o....k{..2|6...H.....c%..........z......~^..j.-s.....o.-........6.L.`.j.-s.....i|..y.Q'....k...}FT.X.jY..Y....o......y..=|6..%..z/........s....>.j.-s.k../.:..........>|/...h...2/..R..-......k....9.y.....j.6Z.j.o....l&..%.UD..`....&..t>".6g..j,..../W=..5...n.......X..h>.k..'...|/h..jfDX.S...`&*...Y....)U]bc[......'(..l..+....b.i....[...If!S...r......i.....Q^..*.....aeddT.`.'....*.[.h....e...?>....n....5......-..j..T..ow......k....-...k16.+i(~..L....j,...c.L./w=j...~./
                              C:\Users\user\AppData\Local\Temp\sqlite.dll
                              Process:C:\Users\user\Desktop\3fVvJyTvQU.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):81408
                              Entropy (8bit):6.295064838876099
                              Encrypted:false
                              SSDEEP:1536:jkOh0YR+kfbE+2AJk64OceTbkS9Co5sWzcdSzEdY+wJpxpbcNop//:jkcjHY+fJhPN9H2SIdY+wJpxpQ8//
                              MD5:05250AA12AD3C6A86DAB6DAB708D17FF
                              SHA1:E41AD72C9A43070BB11FD7411800F71DDDF6BDD8
                              SHA-256:7250A8A1B98D09BE823CD6EFD30D85E5418DFC3541D220BB0694DFCC547478BD
                              SHA-512:A56DF11AF5243150753154E1CBA74E3CDD0CDECF09269B88A3944AC12B73DE59909CE6DBBBD3B1B6DA691D144FAC2599645B2017F66BAC64A106437168EC38C8
                              Malicious:true
                              Antivirus:
                              • Antivirus: Virustotal, Detection: 14%, Browse
                              • Antivirus: ReversingLabs, Detection: 15%
                              Joe Sandbox View:
                              • Filename: TMB1fxNaqR.exe, Detection: malicious, Browse
                              • Filename: LRios3pM39.exe, Detection: malicious, Browse
                              • Filename: CyLELjM5zk.exe, Detection: malicious, Browse
                              • Filename: setup_x86_x64_install.exe, Detection: malicious, Browse
                              Reputation:low
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V..f.x.5.x.5.x.5..r5.x.5..p5dx.5..q5.x.5@..4.x.5@..4.x.5@..4.x.5...5.x.5.x.5Jx.5...4.x.5...4.x.5..|5.x.5...4.x.5Rich.x.5........................PE..L...f@.a...........!................8........................................p............@..........................&..L...<'..(....P.......................`...... ...p...................0...........@............................................text...M........................... ..`.rdata...].......^..................@..@.data........0....... ..............@....rsrc........P.......(..............@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................................

                              Static File Info

                              General

                              File type:PE32 executable (console) Intel 80386, for MS Windows
                              Entropy (8bit):4.57901861732841
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:3fVvJyTvQU.exe
                              File size:57344
                              MD5:4003498f5c38cf05a71125d4e8745791
                              SHA1:5bf2e49a13c64f3f65c0b8ef8a61f8202cde5359
                              SHA256:ad5711a5bdcd7c6334389a2ed722e16e774d8f55737e85f57c71ec3e1767c63b
                              SHA512:e603139a756496abbd867c619ad31a7bed73e8b6f789982d5d4d8fc3a444d3dbd6dd6a6b2aa109f6e1d3ceb6ecc1546987f4379f5ca36f71f360a793c4eb4ff1
                              SSDEEP:768:zQR+JJlY3yGJxNojkTnJI6TWzzejkZy/xbD9BxufhqXKCl3G9:nAoITdT0Zy5bZXYml3G9
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../Q..N?..N?..N?.CF`..N?..l4..N?.NR1..N?..h4..N?..h5..N?.NFb..N?..N>..N?..m...N?.Rich.N?.........PE..L....E.a.................p.

                              File Icon

                              Icon Hash:00828e8e8686b000

                              Static PE Info

                              General

                              Entrypoint:0x40267e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows cui
                              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                              DLL Characteristics:
                              Time Stamp:0x610745D0 [Mon Aug 2 01:09:36 2021 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:2cdeda7a0aa27475a825e9c41d4d95f0

                              Entrypoint Preview

                              Instruction
                              push ebp
                              mov ebp, esp
                              push FFFFFFFFh
                              push 00408150h
                              push 00403E38h
                              mov eax, dword ptr fs:[00000000h]
                              push eax
                              mov dword ptr fs:[00000000h], esp
                              sub esp, 10h
                              push ebx
                              push esi
                              push edi
                              mov dword ptr [ebp-18h], esp
                              call dword ptr [00408050h]
                              xor edx, edx
                              mov dl, ah
                              mov dword ptr [0040CF70h], edx
                              mov ecx, eax
                              and ecx, 000000FFh
                              mov dword ptr [0040CF6Ch], ecx
                              shl ecx, 08h
                              add ecx, edx
                              mov dword ptr [0040CF68h], ecx
                              shr eax, 10h
                              mov dword ptr [0040CF64h], eax
                              push 00000001h
                              call 00007FA9F0C4619Bh
                              pop ecx
                              test eax, eax
                              jne 00007FA9F0C44AAAh
                              push 0000001Ch
                              call 00007FA9F0C44B50h
                              pop ecx
                              call 00007FA9F0C45603h
                              test eax, eax
                              jne 00007FA9F0C44AAAh
                              push 00000010h
                              call 00007FA9F0C44B3Fh
                              pop ecx
                              and dword ptr [ebp-04h], 00000000h
                              call 00007FA9F0C45E43h
                              call dword ptr [0040804Ch]
                              mov dword ptr [0040D658h], eax
                              call 00007FA9F0C45D01h
                              mov dword ptr [0040CF54h], eax
                              call 00007FA9F0C45AAAh
                              call 00007FA9F0C459ECh
                              call 00007FA9F0C4574Fh
                              mov eax, dword ptr [0040CF80h]
                              mov dword ptr [0040CF84h], eax
                              push eax
                              push dword ptr [0040CF78h]
                              push dword ptr [0040CF74h]
                              call 00007FA9F0C44572h
                              add esp, 0Ch

                              Rich Headers

                              Programming Language:
                              • [C++] VS98 (6.0) SP6 build 8804
                              • [ C ] VS98 (6.0) SP6 build 8804

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x8af00x64.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x3d4.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x150.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x6ba70x7000False0.592808314732data6.44090698985IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rdata0x80000x11860x2000False0.27001953125data3.62785728692IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xa0000x365c0x3000False0.0795084635417data0.841262202445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .rsrc0xe0000x10000x1000False0.111083984375data1.09363315293IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_VERSION0xe0580x37cdataEnglishUnited States

                              Imports

                              DLLImport
                              KERNEL32.dllGetProcAddress, LoadLibraryA, lstrlenW, InterlockedDecrement, CloseHandle, WriteFile, CreateFileW, lstrcatW, GetModuleFileNameW, RaiseException, LocalFree, lstrlenA, InterlockedIncrement, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, MultiByteToWideChar, RtlUnwind, GetCommandLineA, GetVersion, ExitProcess, HeapFree, HeapAlloc, GetCurrentThreadId, TlsSetValue, TlsAlloc, SetLastError, TlsGetValue, GetLastError, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, GetModuleHandleA, GetEnvironmentVariableA, GetVersionExA, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapReAlloc, IsBadWritePtr, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, IsBadReadPtr, IsBadCodePtr, GetCPInfo, GetACP, GetOEMCP, HeapSize
                              USER32.dllwsprintfW
                              ole32.dllCoInitializeSecurity, CoUninitialize, CoInitialize, CoCreateInstance, CoSetProxyBlanket
                              OLEAUT32.dllVariantInit, SafeArrayGetDim, SafeArrayGetLBound, SafeArrayGetUBound, SafeArrayAccessData, SafeArrayUnaccessData, SysStringLen, SysAllocStringLen, SysAllocString, VariantClear, SysFreeString, GetErrorInfo

                              Version Infos

                              DescriptionData
                              LegalCopyrightCopyright (C) 1995-2018 VanDyke Software, Inc.
                              InternalNameLicense Helper
                              FileVersion8.5.0.1740
                              CompanyNameVanDyke Software, Inc.
                              Comments\$Revision: 122570 \$
                              ProductNameLicense Helper
                              ProductVersion8.5.0.1740
                              FileDescriptionLicense Helper
                              OriginalFilenameLicenseHelper.exe
                              Translation0x0409 0x04b0

                              Possible Origin

                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States

                              Network Behavior

                              Snort IDS Alerts

                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              08/03/21-23:42:27.324731UDP1948DNS zone transfer UDP5756953192.168.2.334.97.69.225
                              08/03/21-23:42:33.315221UDP1948DNS zone transfer UDP5756953192.168.2.334.97.69.225
                              08/03/21-23:42:43.654284UDP1948DNS zone transfer UDP5756953192.168.2.334.97.69.225
                              08/03/21-23:42:55.609356UDP1948DNS zone transfer UDP5756953192.168.2.334.97.69.225
                              08/03/21-23:43:04.923912ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.334.97.69.225
                              08/03/21-23:43:05.644246ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.334.97.69.225
                              08/03/21-23:43:06.843778ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.334.97.69.225
                              08/03/21-23:43:07.564120ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.334.97.69.225
                              08/03/21-23:43:09.426405ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.334.97.69.225

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Aug 3, 2021 23:42:08.264192104 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.281058073 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.281203985 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.287096024 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.303870916 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.307393074 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.307447910 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.307477951 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.307560921 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.318670988 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.335412979 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.335603952 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.378514051 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.385346889 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.403290987 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.921807051 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.921857119 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.921886921 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.921914101 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.921951056 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.921989918 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.922009945 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.922108889 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.922177076 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.922216892 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.922245026 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.922297001 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.922307014 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.922348976 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.922486067 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.922534943 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.922575951 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.922605991 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.922712088 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:08.923085928 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.923157930 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:08.923270941 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.175451994 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.175498962 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.175534010 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.175575972 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.175605059 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.175611973 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.175653934 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.175673962 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.175688028 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.175703049 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.175932884 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.175975084 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.176001072 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.176013947 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.176049948 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.176105022 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.176722050 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.176764011 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.176800013 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.176834106 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.176837921 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.176873922 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.177556992 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.177594900 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.177649021 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.177679062 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.177679062 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.177722931 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.178124905 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.178167105 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.178204060 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.178239107 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.178250074 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.178320885 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.178942919 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.178983927 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.179012060 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.179105043 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.179135084 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.179177046 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.179208994 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.179280043 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.427622080 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.427695036 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.427738905 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.427767038 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.427803993 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.427833080 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.427968025 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.428467035 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.428498983 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.428536892 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.428572893 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.428653002 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.428764105 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.428802013 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.428848982 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.428889990 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.428935051 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.429013014 CEST49712443192.168.2.3172.67.146.70
                              Aug 3, 2021 23:42:09.429570913 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.429613113 CEST44349712172.67.146.70192.168.2.3
                              Aug 3, 2021 23:42:09.429649115 CEST44349712172.67.146.70192.168.2.3

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Aug 3, 2021 23:41:59.158646107 CEST5062053192.168.2.38.8.8.8
                              Aug 3, 2021 23:41:59.184545994 CEST53506208.8.8.8192.168.2.3
                              Aug 3, 2021 23:41:59.938543081 CEST6493853192.168.2.38.8.8.8
                              Aug 3, 2021 23:41:59.963732958 CEST53649388.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:00.741821051 CEST6015253192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:00.766784906 CEST53601528.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:01.671165943 CEST5754453192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:01.698786974 CEST53575448.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:02.675854921 CEST5598453192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:02.708280087 CEST53559848.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:03.780181885 CEST6418553192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:03.805951118 CEST53641858.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:04.752377033 CEST6511053192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:04.776922941 CEST53651108.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:05.417403936 CEST5836153192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:05.449994087 CEST53583618.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:06.845972061 CEST6349253192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:06.873339891 CEST53634928.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:07.835000038 CEST6083153192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:07.867800951 CEST53608318.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:08.197936058 CEST6010053192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:08.233841896 CEST53601008.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:08.555628061 CEST5319553192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:08.580760002 CEST53531958.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:09.380799055 CEST5014153192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:09.417661905 CEST53501418.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:10.217458010 CEST5302353192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:10.244851112 CEST53530238.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:10.861213923 CEST4956353192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:10.888822079 CEST53495638.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:11.512830973 CEST5135253192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:11.540487051 CEST53513528.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:12.335515976 CEST5934953192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:12.361551046 CEST53593498.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:13.635502100 CEST5708453192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:13.660516024 CEST53570848.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:16.394717932 CEST5882353192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:16.395879984 CEST5756853192.168.2.38.8.8.8
                              Aug 3, 2021 23:42:16.422513962 CEST53588238.8.8.8192.168.2.3
                              Aug 3, 2021 23:42:16.431968927 CEST53575688.8.8.8192.168.2.3

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Aug 3, 2021 23:42:08.197936058 CEST192.168.2.38.8.8.80x293Standard query (0)a.goatgame.coA (IP address)IN (0x0001)
                              Aug 3, 2021 23:42:16.394717932 CEST192.168.2.38.8.8.80x7c06Standard query (0)google.vrthcobj.comA (IP address)IN (0x0001)
                              Aug 3, 2021 23:42:16.395879984 CEST192.168.2.38.8.8.80xbcfdStandard query (0)google.vrthcobj.com28IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Aug 3, 2021 23:42:08.233841896 CEST8.8.8.8192.168.2.30x293No error (0)a.goatgame.co172.67.146.70A (IP address)IN (0x0001)
                              Aug 3, 2021 23:42:08.233841896 CEST8.8.8.8192.168.2.30x293No error (0)a.goatgame.co104.21.79.144A (IP address)IN (0x0001)
                              Aug 3, 2021 23:42:16.422513962 CEST8.8.8.8192.168.2.30x7c06No error (0)google.vrthcobj.com34.97.69.225A (IP address)IN (0x0001)

                              HTTPS Packets

                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                              Aug 3, 2021 23:42:08.307447910 CEST172.67.146.70443192.168.2.349712CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=California, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IESun Jul 18 02:00:00 CEST 2021 Mon Jan 27 13:48:08 CET 2020Mon Jul 18 01:59:59 CEST 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                              CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:23:42:04
                              Start date:03/08/2021
                              Path:C:\Users\user\Desktop\3fVvJyTvQU.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\3fVvJyTvQU.exe'
                              Imagebase:0x400000
                              File size:57344 bytes
                              MD5 hash:4003498F5C38CF05A71125D4E8745791
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:23:42:05
                              Start date:03/08/2021
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:23:42:06
                              Start date:03/08/2021
                              Path:C:\Users\user\Desktop\3fVvJyTvQU.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\3fVvJyTvQU.exe' -a
                              Imagebase:0x400000
                              File size:57344 bytes
                              MD5 hash:4003498F5C38CF05A71125D4E8745791
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:23:42:06
                              Start date:03/08/2021
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Disassembly

                              Code Analysis

                              Reset < >