Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PqJockhBoA.exe

Overview

General Information

Sample name:PqJockhBoA.exe
renamed because original name is a hash value
Original sample name:a4fe52bb9ff7d20b6b00d0a0c0f73edf3e27c1aaf97bf03a4a609b802c9d9358.exe
Analysis ID:1588588
MD5:72d434d6d5ed6a8352796ab0dd4b275b
SHA1:9be0b0675c65a3ea8cbc2dfb651ae23aee4aecd6
SHA256:a4fe52bb9ff7d20b6b00d0a0c0f73edf3e27c1aaf97bf03a4a609b802c9d9358
Tags:exeuser-adrian__luca
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • PqJockhBoA.exe (PID: 7432 cmdline: "C:\Users\user\Desktop\PqJockhBoA.exe" MD5: 72D434D6D5ED6A8352796AB0DD4B275B)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PqJockhBoA.exeReversingLabs: Detection: 65%
Source: PqJockhBoA.exeVirustotal: Detection: 66%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.0% probability
Source: PqJockhBoA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: PqJockhBoA.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 45.9.191.182 45.9.191.182
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: xianggrhen.com
Source: PqJockhBoA.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: PqJockhBoA.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: PqJockhBoA.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: PqJockhBoA.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: PqJockhBoA.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: PqJockhBoA.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: PqJockhBoA.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: PqJockhBoA.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: PqJockhBoA.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C3E000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BEA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C2A000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BAA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BDF000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BC3000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com
Source: PqJockhBoA.exeString found in binary or memory: http://xianggrhen.com/basket/Snobzw.vdf
Source: PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com/basket/Snobzw.vdfto
Source: PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C3E000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BEA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BCC000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C2A000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BAA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.comD
Source: PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C3E000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.comHK
Source: PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C3E000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BEA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C2A000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BAA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BDF000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BC3000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.comd
Source: PqJockhBoA.exeString found in binary or memory: https://sectigo.com/CPS0
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess Stats: CPU usage > 49%
Source: PqJockhBoA.exeStatic PE information: invalid certificate
Source: PqJockhBoA.exe, 00000000.00000002.3779115422.0000000000DFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PqJockhBoA.exe
Source: PqJockhBoA.exe, 00000000.00000000.1306257786.000000000070A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQnxgltx.exe vs PqJockhBoA.exe
Source: PqJockhBoA.exeBinary or memory string: OriginalFilenameQnxgltx.exe vs PqJockhBoA.exe
Source: PqJockhBoA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal52.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\PqJockhBoA.exeMutant created: NULL
Source: PqJockhBoA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: PqJockhBoA.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\PqJockhBoA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PqJockhBoA.exeReversingLabs: Detection: 65%
Source: PqJockhBoA.exeVirustotal: Detection: 66%
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: fwpuclnt.dllJump to behavior
Source: PqJockhBoA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: PqJockhBoA.exeStatic file information: File size 1202816 > 1048576
Source: PqJockhBoA.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeMemory allocated: DB0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeMemory allocated: 2890000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeWindow / User API: threadDelayed 2221Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeWindow / User API: threadDelayed 7590Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -27670116110564310s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7496Thread sleep count: 2221 > 30Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7496Thread sleep count: 7590 > 30Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -99874s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -99765s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -99656s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -99546s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -99437s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -99327s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -99218s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -99109s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -98998s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -98875s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -98764s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -98640s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -98530s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -98346s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -98230s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -98050s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -97923s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -97718s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -97609s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -97500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -97389s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -97265s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -97156s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -97046s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -96922s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -96812s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -96703s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -96593s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -96484s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -96375s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -96265s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -96156s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -96046s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -95922s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -95812s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -95703s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -95593s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -95484s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -95375s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -95261s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -95078s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -94948s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -94843s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -94726s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -94625s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -94515s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -94406s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -94296s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 7464Thread sleep time: -94187s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 99874Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 99765Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 99656Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 99546Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 99437Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 99327Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 99218Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 99109Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 98998Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 98875Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 98764Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 98640Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 98530Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 98346Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 98230Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 98050Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 97923Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 97718Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 97609Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 97500Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 97389Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 97265Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 97156Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 97046Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 96922Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 96812Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 96703Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 96593Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 96484Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 96375Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 96265Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 96156Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 96046Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 95922Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 95812Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 95703Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 95593Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 95484Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 95375Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 95261Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 95078Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 94948Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 94843Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 94726Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 94625Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 94515Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 94406Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 94296Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 94187Jump to behavior
Source: PqJockhBoA.exe, 00000000.00000002.3779115422.0000000000E7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeQueries volume information: C:\Users\user\Desktop\PqJockhBoA.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PqJockhBoA.exe66%ReversingLabsWin32.Trojan.Jalapeno
PqJockhBoA.exe67%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://xianggrhen.com/basket/Snobzw.vdfto0%Avira URL Cloudsafe
http://xianggrhen.com0%Avira URL Cloudsafe
http://xianggrhen.com/basket/Snobzw.vdf0%Avira URL Cloudsafe
http://xianggrhen.comHK0%Avira URL Cloudsafe
http://xianggrhen.comD0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
xianggrhen.com
45.9.191.182
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://xianggrhen.com/basket/Snobzw.vdffalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tPqJockhBoA.exefalse
      high
      https://sectigo.com/CPS0PqJockhBoA.exefalse
        high
        http://xianggrhen.com/basket/Snobzw.vdftoPqJockhBoA.exe, 00000000.00000002.3779680746.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yPqJockhBoA.exefalse
          high
          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0PqJockhBoA.exefalse
            high
            http://ocsp.sectigo.com0PqJockhBoA.exefalse
              high
              http://xianggrhen.comHKPqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C3E000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BF2000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#PqJockhBoA.exefalse
                high
                http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#PqJockhBoA.exefalse
                  high
                  http://xianggrhen.comPqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C3E000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BEA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C2A000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BAA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BDF000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BC3000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C54000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#PqJockhBoA.exefalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BAA000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://xianggrhen.comDPqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C3E000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BEA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BCC000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C2A000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BAA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BC3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://xianggrhen.comdPqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C3E000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BEA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C2A000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BAA000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BDF000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002BC3000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.3779680746.0000000002C54000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        45.9.191.182
                        xianggrhen.comGermany
                        47583AS-HOSTINGERLTfalse
                        Joe Sandbox version:42.0.0 Malachite
                        Analysis ID:1588588
                        Start date and time:2025-01-11 02:48:15 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 33s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:8
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:PqJockhBoA.exe
                        renamed because original name is a hash value
                        Original Sample Name:a4fe52bb9ff7d20b6b00d0a0c0f73edf3e27c1aaf97bf03a4a609b802c9d9358.exe
                        Detection:MAL
                        Classification:mal52.winEXE@1/0@1/1
                        EGA Information:Failed
                        HCA Information:Failed
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
                        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target PqJockhBoA.exe, PID 7432 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        TimeTypeDescription
                        20:49:14API Interceptor10582589x Sleep call for process: PqJockhBoA.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        45.9.191.182EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/book/Fvrbzpfzrm.vdf
                        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/book/Fvrbzpfzrm.vdf
                        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/book/Netnoyfq.mp3
                        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/composure/Emmaj.vdf
                        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/composure/Vuglyxyuvio.pdf
                        MN-PAYMENT20241206-5002-10259-410291-30198-281920-30183-21474.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/camp/Reibbfkkyy.dat
                        DecPayment410_F2103_S29103_M839_U4721_S381I_S98EEU_USD031224.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/desk/Tbddfcris.vdf
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        xianggrhen.comEZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        MN-PAYMENT20241206-5002-10259-410291-30198-281920-30183-21474.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        DecPayment410_F2103_S29103_M839_U4721_S381I_S98EEU_USD031224.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        AMTR-TT4781-SWFT-U4Y81-SO39-C37AR-AO937-CNR742-S3782-2818DY-9A82.exeGet hashmaliciousUnknownBrowse
                        • 92.113.29.113
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        AS-HOSTINGERLTEZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
                        • 92.249.45.121
                        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
                        • 92.249.45.121
                        MN-PAYMENT20241206-5002-10259-410291-30198-281920-30183-21474.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        DecPayment410_F2103_S29103_M839_U4721_S381I_S98EEU_USD031224.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        https://application-workspace.com/red-bull/id-38772Get hashmaliciousUnknownBrowse
                        • 45.84.207.234
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):5.926791619503864
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                        • Win32 Executable (generic) a (10002005/4) 49.97%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:PqJockhBoA.exe
                        File size:1'202'816 bytes
                        MD5:72d434d6d5ed6a8352796ab0dd4b275b
                        SHA1:9be0b0675c65a3ea8cbc2dfb651ae23aee4aecd6
                        SHA256:a4fe52bb9ff7d20b6b00d0a0c0f73edf3e27c1aaf97bf03a4a609b802c9d9358
                        SHA512:d924de930e4a5cf692e7863ab9c0d7118ab82991006540adf26287db581f2860af4dd6f0f918397b3492c4702efd5af23ce1e6c0b9fed900908662a44fe7b3b0
                        SSDEEP:12288:Y06exAOZvzn3yu+3hj6sdrtPBBKGdHMzxgl5e+QpJdSWWOpMjBkMmL4Wzr9Koc9m:YsB3yuA3jgpVwZNrRpSERLYVBB
                        TLSH:D945B4D5EF45D872C50A06F7D0AE2A254260C1619BC3EF071DA4CB288E69BDDCED34E6
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...~hQg.................b............... ........@.. ....................................`................................
                        Icon Hash:125ada12e9cc368b
                        Entrypoint:0x4f811a
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x6751687E [Thu Dec 5 08:46:54 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Signature Valid:false
                        Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                        Signature Validation Error:The digital signature of the object did not verify
                        Error Number:-2146869232
                        Not Before, Not After
                        • 06/09/2023 02:00:00 06/09/2026 01:59:59
                        Subject Chain
                        • CN=Janos Mathe, O=Janos Mathe, S=Fej\xe9r, C=HU
                        Version:3
                        Thumbprint MD5:AC9BAE96C38C5DB7CC68746FF2289F19
                        Thumbprint SHA-1:13FA1C1DB6E071F6904C6B6A36DF32D598534F47
                        Thumbprint SHA-256:665EC763CE4C00ACC0838CCD912356D9EF16A9B8201234BDA5EB77BD752ABC55
                        Serial:00A6662F1C09DA0BE6EA30BBE076306A55
                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xf80d00x4a.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xfa0000x2b45c.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x121c000x3e80
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1260000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000xf61200xf6200c9a5f831501fa559be5f01237f96de16False0.3436220400584053data5.844337867665367IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rsrc0xfa0000x2b45c0x2b6008419137ca98d8c50bcbefe8a461c5831False0.16103431195965417data3.7712800338554096IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x1260000xc0x200e35e4c087b858de619eb8479f93d3622False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0xfa0ac0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 11811 x 11811 px/m0.3528368794326241
                        RT_ICON0xfa5380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 11811 x 11811 px/m0.2581967213114754
                        RT_ICON0xfaee40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 11811 x 11811 px/m0.20590994371482177
                        RT_ICON0xfbfb00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 11811 x 11811 px/m0.14470954356846474
                        RT_ICON0xfe57c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 11811 x 11811 px/m0.11767831837505904
                        RT_ICON0x1027c80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 11811 x 11811 px/m0.10642329020332718
                        RT_ICON0x107c740x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 11811 x 11811 px/m0.08616249737229346
                        RT_ICON0x1111400x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 11811 x 11811 px/m0.06911747308647817
                        RT_ICON0x12198c0x3228PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9858255451713396
                        RT_GROUP_ICON0x124bf00x84data0.7121212121212122
                        RT_VERSION0x124cb00x586data0.28076379066478074
                        RT_MANIFEST0x1252720x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                        DLLImport
                        mscoree.dll_CorExeMain
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2025 02:49:15.491163015 CET4970380192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:15.498600960 CET804970345.9.191.182192.168.2.7
                        Jan 11, 2025 02:49:15.498699903 CET4970380192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:15.500231981 CET4970380192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:15.505301952 CET804970345.9.191.182192.168.2.7
                        Jan 11, 2025 02:49:36.898036003 CET804970345.9.191.182192.168.2.7
                        Jan 11, 2025 02:49:36.898173094 CET4970380192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:36.908313036 CET4970380192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:36.909749985 CET4980980192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:36.913208961 CET804970345.9.191.182192.168.2.7
                        Jan 11, 2025 02:49:36.914710045 CET804980945.9.191.182192.168.2.7
                        Jan 11, 2025 02:49:36.914787054 CET4980980192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:36.914922953 CET4980980192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:36.919688940 CET804980945.9.191.182192.168.2.7
                        Jan 11, 2025 02:49:58.296247005 CET804980945.9.191.182192.168.2.7
                        Jan 11, 2025 02:49:58.296308994 CET4980980192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:58.326976061 CET4980980192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:58.331923008 CET804980945.9.191.182192.168.2.7
                        Jan 11, 2025 02:49:58.432696104 CET4994480192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:58.437525034 CET804994445.9.191.182192.168.2.7
                        Jan 11, 2025 02:49:58.437599897 CET4994480192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:58.438541889 CET4994480192.168.2.745.9.191.182
                        Jan 11, 2025 02:49:58.443353891 CET804994445.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:19.800285101 CET804994445.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:19.800383091 CET4994480192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:19.801070929 CET4994480192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:19.802175045 CET4997780192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:19.805814028 CET804994445.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:19.806945086 CET804997745.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:19.807017088 CET4997780192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:19.807135105 CET4997780192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:19.812654018 CET804997745.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:41.191481113 CET804997745.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:41.194159031 CET4997780192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:41.198291063 CET4997780192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:41.199872017 CET4997880192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:41.203116894 CET804997745.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:41.204793930 CET804997845.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:41.204910040 CET4997880192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:41.205178976 CET4997880192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:41.209964037 CET804997845.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:50.539985895 CET4997980192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:50.539994001 CET4997880192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:50.544891119 CET804997945.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:50.545067072 CET4997980192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:50.545160055 CET4997980192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:50.549891949 CET804997945.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:50.588248968 CET804997845.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:57.475799084 CET4997980192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:57.477459908 CET4998080192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:57.482259989 CET804998045.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:57.482328892 CET4998080192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:57.482498884 CET4998080192.168.2.745.9.191.182
                        Jan 11, 2025 02:50:57.487240076 CET804998045.9.191.182192.168.2.7
                        Jan 11, 2025 02:50:57.524283886 CET804997945.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:02.603688955 CET804997845.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:02.604314089 CET4997880192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:11.804271936 CET4998080192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:11.806199074 CET4998180192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:11.811157942 CET804998145.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:11.811265945 CET4998180192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:11.811439991 CET4998180192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:11.816349030 CET804998145.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:11.852411985 CET804998045.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:11.911355019 CET804997945.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:11.911479950 CET4997980192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:18.413814068 CET4998180192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:18.416398048 CET4998280192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:18.421278000 CET804998245.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:18.421397924 CET4998280192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:18.421526909 CET4998280192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:18.426356077 CET804998245.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:18.460506916 CET804998145.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:18.864718914 CET804998045.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:18.864809036 CET4998080192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:19.554656029 CET4998280192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:19.557920933 CET4998380192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:19.562815905 CET804998345.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:19.562906027 CET4998380192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:19.563101053 CET4998380192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:19.567909956 CET804998345.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:19.604393959 CET804998245.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:28.476257086 CET4998380192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:28.478411913 CET4998480192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:28.497644901 CET804998445.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:28.498563051 CET4998480192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:28.502434969 CET4998480192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:28.515846014 CET804998445.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:28.532507896 CET804998345.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:33.194639921 CET804998145.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:33.194715023 CET4998180192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:33.476315022 CET4998480192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:33.478101969 CET4998580192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:33.482963085 CET804998545.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:33.483036041 CET4998580192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:33.483207941 CET4998580192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:33.487921000 CET804998545.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:33.524591923 CET804998445.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:37.163837910 CET4998580192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:37.165252924 CET4998680192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:37.171432018 CET804998645.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:37.171495914 CET4998680192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:37.171658993 CET4998680192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:37.178273916 CET804998645.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:37.212656021 CET804998545.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:39.757710934 CET4998680192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:39.759905100 CET4998780192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:39.766529083 CET804998745.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:39.766715050 CET4998780192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:39.766787052 CET4998780192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:39.771976948 CET804998745.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:39.804596901 CET804998645.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:39.819705963 CET804998245.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:39.819770098 CET4998280192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:41.538445950 CET804998345.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:41.538501024 CET804998345.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:41.538516045 CET4998380192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:41.538592100 CET4998380192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:41.538618088 CET804998345.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:41.538672924 CET4998380192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:41.543405056 CET804998345.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:41.543442011 CET804998345.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:49.883749962 CET804998445.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:49.883912086 CET4998480192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:51.710994959 CET4998780192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:51.714144945 CET4998880192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:51.720344067 CET804998845.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:51.721628904 CET4998880192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:51.721628904 CET4998880192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:51.727477074 CET804998845.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:51.764775038 CET804998745.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:54.856492996 CET804998545.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:54.857300997 CET4998580192.168.2.745.9.191.182
                        Jan 11, 2025 02:51:58.521594048 CET804998645.9.191.182192.168.2.7
                        Jan 11, 2025 02:51:58.521856070 CET4998680192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:01.132910013 CET804998745.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:01.132977962 CET4998780192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:06.023504972 CET4998880192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:06.025252104 CET4998980192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:06.030170918 CET804998945.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:06.030239105 CET4998980192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:06.030443907 CET4998980192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:06.035240889 CET804998945.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:06.072848082 CET804998845.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:10.320874929 CET4998980192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:10.321854115 CET4999080192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:10.328432083 CET804999045.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:10.330856085 CET4999080192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:10.331140041 CET4999080192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:10.337197065 CET804999045.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:10.368871927 CET804998945.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:10.852243900 CET4999080192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:10.854896069 CET4999180192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:10.859782934 CET804999145.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:10.861893892 CET4999180192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:10.862186909 CET4999180192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:10.866950989 CET804999145.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:10.900969982 CET804999045.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:13.084321976 CET804998845.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:13.084386110 CET4998880192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:14.648572922 CET4999180192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:14.650103092 CET4999280192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:14.654992104 CET804999245.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:14.655076981 CET4999280192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:14.655281067 CET4999280192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:14.660260916 CET804999245.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:14.696959972 CET804999145.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:21.179985046 CET4999280192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:21.181735992 CET4999380192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:21.186599016 CET804999345.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:21.186687946 CET4999380192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:21.186857939 CET4999380192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:21.191708088 CET804999345.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:21.229809999 CET804999245.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:27.398791075 CET804998945.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:27.398930073 CET4998980192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:31.712301016 CET804999045.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:31.712450027 CET4999080192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:31.774279118 CET4999380192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:31.779124975 CET4999480192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:31.783982992 CET804999445.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:31.784116983 CET4999480192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:31.784276962 CET4999480192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:31.789513111 CET804999445.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:31.824976921 CET804999345.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:32.229196072 CET804999145.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:32.229274035 CET4999180192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:36.030889034 CET804999245.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:36.031090021 CET4999280192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:42.538155079 CET804999345.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:42.538376093 CET4999380192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:50.102404118 CET4999480192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:50.105861902 CET4999580192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:50.110853910 CET804999545.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:50.113400936 CET4999580192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:50.113601923 CET4999580192.168.2.745.9.191.182
                        Jan 11, 2025 02:52:50.118457079 CET804999545.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:50.149106979 CET804999445.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:53.163467884 CET804999445.9.191.182192.168.2.7
                        Jan 11, 2025 02:52:53.167224884 CET4999480192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:00.258519888 CET4999580192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:00.260366917 CET4999680192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:00.265269041 CET804999645.9.191.182192.168.2.7
                        Jan 11, 2025 02:53:00.265434027 CET4999680192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:00.265676022 CET4999680192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:00.270489931 CET804999645.9.191.182192.168.2.7
                        Jan 11, 2025 02:53:00.305191994 CET804999545.9.191.182192.168.2.7
                        Jan 11, 2025 02:53:08.539758921 CET4999680192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:08.541548967 CET4999780192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:08.546349049 CET804999745.9.191.182192.168.2.7
                        Jan 11, 2025 02:53:08.546406984 CET4999780192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:08.546562910 CET4999780192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:08.551378965 CET804999745.9.191.182192.168.2.7
                        Jan 11, 2025 02:53:08.585282087 CET804999645.9.191.182192.168.2.7
                        Jan 11, 2025 02:53:11.496090889 CET804999545.9.191.182192.168.2.7
                        Jan 11, 2025 02:53:11.497648954 CET4999580192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:21.636818886 CET804999645.9.191.182192.168.2.7
                        Jan 11, 2025 02:53:21.639499903 CET4999680192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:22.762089014 CET4999780192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:22.762310028 CET4999880192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:22.767189980 CET804999845.9.191.182192.168.2.7
                        Jan 11, 2025 02:53:22.767252922 CET4999880192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:22.767497063 CET4999880192.168.2.745.9.191.182
                        Jan 11, 2025 02:53:22.772231102 CET804999845.9.191.182192.168.2.7
                        Jan 11, 2025 02:53:22.809552908 CET804999745.9.191.182192.168.2.7
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2025 02:49:15.469213009 CET4947253192.168.2.71.1.1.1
                        Jan 11, 2025 02:49:15.482856989 CET53494721.1.1.1192.168.2.7
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 11, 2025 02:49:15.469213009 CET192.168.2.71.1.1.10x9038Standard query (0)xianggrhen.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 11, 2025 02:49:15.482856989 CET1.1.1.1192.168.2.70x9038No error (0)xianggrhen.com45.9.191.182A (IP address)IN (0x0001)false
                        • xianggrhen.com
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.74970345.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:49:15.500231981 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.74980945.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:49:36.914922953 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.74994445.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:49:58.438541889 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        3192.168.2.74997745.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:50:19.807135105 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        4192.168.2.74997845.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:50:41.205178976 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        5192.168.2.74997945.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:50:50.545160055 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        6192.168.2.74998045.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:50:57.482498884 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        7192.168.2.74998145.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:51:11.811439991 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        8192.168.2.74998245.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:51:18.421526909 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        9192.168.2.74998345.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:51:19.563101053 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        10192.168.2.74998445.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:51:28.502434969 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        11192.168.2.74998545.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:51:33.483207941 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        12192.168.2.74998645.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:51:37.171658993 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        13192.168.2.74998745.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:51:39.766787052 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        14192.168.2.74998845.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:51:51.721628904 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        15192.168.2.74998945.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:52:06.030443907 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        16192.168.2.74999045.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:52:10.331140041 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        17192.168.2.74999145.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:52:10.862186909 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        18192.168.2.74999245.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:52:14.655281067 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        19192.168.2.74999345.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:52:21.186857939 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        20192.168.2.74999445.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:52:31.784276962 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        21192.168.2.74999545.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:52:50.113601923 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        22192.168.2.74999645.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:53:00.265676022 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        23192.168.2.74999745.9.191.182807432C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:53:08.546562910 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination Port
                        24192.168.2.74999845.9.191.18280
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:53:22.767497063 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:20:49:14
                        Start date:10/01/2025
                        Path:C:\Users\user\Desktop\PqJockhBoA.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\PqJockhBoA.exe"
                        Imagebase:0x610000
                        File size:1'202'816 bytes
                        MD5 hash:72D434D6D5ED6A8352796AB0DD4B275B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Reset < >
                          Memory Dump Source
                          • Source File: 00000000.00000002.3779415827.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2940000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b7e8a58877564cda3984619b2faf317bc4d464b86d7e9390e08c12827b8d55fd
                          • Instruction ID: c57d8328ce70e03ac35c96275adf725f1bd68cb6062a0d817e1ed4b870c798ea
                          • Opcode Fuzzy Hash: b7e8a58877564cda3984619b2faf317bc4d464b86d7e9390e08c12827b8d55fd
                          • Instruction Fuzzy Hash: 78311370D012589FDF24DFAAC580AEEBFF5BF48300F248429E859AB250DB349945CFA0
                          Memory Dump Source
                          • Source File: 00000000.00000002.3778953424.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d1d000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6e9b7419c9cf1f2745436ed87f1e3594a394deff3e04497457b990e810071603
                          • Instruction ID: d9c3e44bb379b492d3e172c0f7448d4d7090f2019722457be92a1fa5fa66295a
                          • Opcode Fuzzy Hash: 6e9b7419c9cf1f2745436ed87f1e3594a394deff3e04497457b990e810071603
                          • Instruction Fuzzy Hash: CE2125B1500300EFDB14DF10E9C0B56BB66FB98314F24C569E8090B256C736E896CAB2
                          Memory Dump Source
                          • Source File: 00000000.00000002.3778953424.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d1d000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 14c6bea1b0f6aaacb7db59bffceb06c36f0ab32707ada9f1390ddb9994ea60e7
                          • Instruction ID: bb14b2810f3e2fb67e802591acbca543862c310b860fd2a32fe608271afb4877
                          • Opcode Fuzzy Hash: 14c6bea1b0f6aaacb7db59bffceb06c36f0ab32707ada9f1390ddb9994ea60e7
                          • Instruction Fuzzy Hash: B511B676504280DFCF15CF10D5C4B56BF72FB94314F28C6A9D8494B656C336E89ACBA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3778953424.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d1d000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7cb5165eef38c2a1b3b83d804509d622749cdb8293e186a333dc2cafa6573eae
                          • Instruction ID: 41a232b0e6208a7d81c16f7d78f1a2e67d657ce8e8496f5e97b3357f186edb53
                          • Opcode Fuzzy Hash: 7cb5165eef38c2a1b3b83d804509d622749cdb8293e186a333dc2cafa6573eae
                          • Instruction Fuzzy Hash: 1C01A231508344AAE7204A15EDC4BA6FB99EF41724F18C41AED4A0A2C2CB78DC84DAB2
                          Memory Dump Source
                          • Source File: 00000000.00000002.3778953424.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d1d000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ddc80a533d4fc7b80e0dd43c1fa0fc3bbb5b525b241d73d9308357d5cf6caab5
                          • Instruction ID: 675d30476d16bef8701292334b2a2d8ed3a613e379c61c16ac803d5983619c00
                          • Opcode Fuzzy Hash: ddc80a533d4fc7b80e0dd43c1fa0fc3bbb5b525b241d73d9308357d5cf6caab5
                          • Instruction Fuzzy Hash: EBF0C231404344AEE7208A05EDC4BA2FB98EB51734F18C05AFD490B682C3789C44CB71
                          Memory Dump Source
                          • Source File: 00000000.00000002.3779415827.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2940000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6b5dd7a9f8c9ba27ce1699b590188f527526c35772ac70b139ac774ab7878bcb
                          • Instruction ID: 9d8e4465aac715dfa9560f65fd02fad9eaab94b51c6b98b99358d40957729506
                          • Opcode Fuzzy Hash: 6b5dd7a9f8c9ba27ce1699b590188f527526c35772ac70b139ac774ab7878bcb
                          • Instruction Fuzzy Hash: 91E04F6C20D101EF87146A6AD404D3A7AA9EA866903544C9AF447C7368DE109E01C672