Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
java.exe

Overview

General Information

Sample Name:java.exe
Analysis ID:745315
MD5:830ebc951ec7fe682a8917f58fdae098
SHA1:078a4189fce94f757534d827344fbc55c5e04156
SHA256:ac63f0631e9e20c2b3683bdcb1b8c1006a9b6430b95b1d1c0d2347cdf97df6e4
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Detected Stratum mining protocol
Machine Learning detection for sample
Potential thread-based time evasion detected
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Abnormal high CPU Usage

Classification

  • System is w7x64
  • java.exe (PID: 1448 cmdline: C:\Users\user\Desktop\java.exe MD5: 830EBC951EC7FE682A8917F58FDAE098)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:192.168.2.22109.71.252.45491714432831812 11/14/22-07:24:42.896816
SID:2831812
Source Port:49171
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.22109.71.252.45491714432831074 11/14/22-07:24:42.896816
SID:2831074
Source Port:49171
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.228.8.8.855868532016778 11/14/22-07:24:42.601249
SID:2016778
Source Port:55868
Destination Port:53
Protocol:UDP
Classtype:Potentially Bad Traffic

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: java.exeAvira: detected
Source: java.exeReversingLabs: Detection: 58%
Source: java.exeVirustotal: Detection: 56%Perma Link
Source: eu.minerpool.pwVirustotal: Detection: 14%Perma Link
Source: java.exeJoe Sandbox ML: detected

Bitcoin Miner

barindex
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.252.45:443 payload: data raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6c 6f 67 69 6e 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 6c 6f 67 69 6e 22 3a 22 77 65 62 6c 57 69 6e 22 2c 22 70 61 73 73 22 3a 22 22 2c 22 61 67 65 6e 74 22 3a 22 4a 61 76 61 28 54 4d 29 20 50 6c 61 74 66 6f 72 6d 20 53 45 20 38 2f 31 2e 38 2e 30 5f 31 37 31 2d 62 31 31 20 28 57 69 6e 64 6f 77 73 20 4e 54 20 36 2e 31 3b 20 57 69 6e 36 34 3b 20 78 36 34 29 20 6c 69 62 75 76 2f 31 2e 33 38 2e 30 20 6d 73 76 63 2f 32 30 31 39 22 2c 22 61 6c 67 6f 22 3a 5b 22 63 6e 2f 31 22 2c 22 63 6e 2f 32 22 2c 22 63 6e 2f 72 22 2c 22 63 6e 2f 66 61 73 74 22 2c 22 63 6e 2f 68 61 6c 66 22 2c 22 63 6e 2f 78 61 6f 22 2c 22 63 6e 2f 72 74 6f 22 2c 22 63 6e 2f 72 77 7a 22 2c 22 data ascii: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"weblwin","pass":"","agent":"java(tm) platform se 8/1.8.0_171-b11 (windows nt 6.1; win64; x64) libuv/1.38.0 msvc/2019","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","
Source: java.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

Networking

barindex
Source: TrafficSnort IDS: 2831812 ETPRO TROJAN CoinMiner Known Malicious Stratum Authline (2018-07-16 8) 192.168.2.22:49171 -> 109.71.252.45:443
Source: TrafficSnort IDS: 2831074 ETPRO TROJAN CoinMiner Known Malicious Stratum Authline (2018-05-29 11) 192.168.2.22:49171 -> 109.71.252.45:443
Source: TrafficSnort IDS: 2016778 ET DNS Query to a *.pw domain - Likely Hostile 192.168.2.22:55868 -> 8.8.8.8:53
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
Source: unknownDNS traffic detected: queries for: eu.minerpool.pw
Source: C:\Users\user\Desktop\java.exeProcess Stats: CPU usage > 98%
Source: java.exeStatic PE information: Section: UPX1 ZLIB complexity 0.9991264115124331
Source: java.exeReversingLabs: Detection: 58%
Source: java.exeVirustotal: Detection: 56%
Source: C:\Users\user\Desktop\java.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\java.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{56FDF344-FD6D-11D0-958A-006097C9A090}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\java.exeMutant created: \Sessions\1\BaseNamedObjects\4pC39Ev2yuzFY8izw76DGDJR
Source: classification engineClassification label: mal92.evad.mine.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\java.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: java.exeStatic file information: File size 1639424 > 1048576
Source: java.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: java.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x18d200
Source: java.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\java.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\java.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: java.exe, 00000001.00000002.1423529584.000000000038E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEW4
Source: Initial fileSignature Results: Thread-based counter
Source: C:\Users\user\Desktop\java.exe TID: 152Thread sleep count: 329 > 30Jump to behavior
Source: C:\Users\user\Desktop\java.exe TID: 152Thread sleep time: -164500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\java.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\java.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\java.exeProcess information queried: ProcessInformationJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Virtualization/Sandbox Evasion
OS Credential Dumping3
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
Software Packing
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Remote System Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
java.exe59%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
java.exe56%VirustotalBrowse
java.exe100%AviraHEUR/AGEN.1213003
java.exe100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
1.0.java.exe.13fa10000.0.unpack100%AviraHEUR/AGEN.1213003Download File
SourceDetectionScannerLabelLink
eu.minerpool.pw15%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
eu.minerpool.pw
107.182.129.82
truefalseunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
109.71.252.45
unknownGermany
207770ATLANTIACLOUDNLtrue
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:745315
Start date and time:2022-11-14 07:23:55 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 45s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:java.exe
Cookbook file name:default.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal92.evad.mine.winEXE@1/0@1/1
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240s for sample files taking high CPU consumption
  • Exclude process from analysis (whitelisted): dllhost.exe
TimeTypeDescription
07:25:12API Interceptor256x Sleep call for process: java.exe modified
No context
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
eu.minerpool.pwsasd.batGet hashmaliciousBrowse
  • 185.10.68.220
services.exeGet hashmaliciousBrowse
  • 185.10.68.86
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
ATLANTIACLOUDNLDhl Waybill Document.docGet hashmaliciousBrowse
  • 109.71.253.24
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Entropy (8bit):7.998805720258012
TrID:
  • UPX compressed Win32 Executable (30571/9) 65.62%
  • Win64 Executable (generic) (12005/4) 25.77%
  • Generic Win/DOS Executable (2004/3) 4.30%
  • DOS Executable Generic (2002/1) 4.30%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.02%
File name:java.exe
File size:1639424
MD5:830ebc951ec7fe682a8917f58fdae098
SHA1:078a4189fce94f757534d827344fbc55c5e04156
SHA256:ac63f0631e9e20c2b3683bdcb1b8c1006a9b6430b95b1d1c0d2347cdf97df6e4
SHA512:34ac7837e337d448708ee44e267fa7159d8af89362319164a4ad8a03ce244ac713a6fdc3cca23a820d275e8dd47eba4e931a14693f2e84f220adc0dd779a5643
SSDEEP:49152:zpYmFTLZIKFp/XE9cp2us3AKrJ0Qt9s4C:zpYuxPE9cBs3AKraL4
TLSH:857533A583746255CDDF05F8914F1CF0C85A7FDFAE28A31E2A66BE2287B33425190637
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...J^ec.....................0...0[...t..@[....@.............................Pt...........`................................
Icon Hash:8a8c8e8eaa868f86
Entrypoint:0x1407403d0
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x63655E4A [Fri Nov 4 18:47:38 2022 UTC]
TLS Callbacks:0x40740f89, 0x1
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:bb388b5fb16beacfa2a7403d25eaa8c4
Instruction
push ebx
push esi
push edi
push ebp
dec eax
lea esi, dword ptr [FFE73C4Ah]
dec eax
lea edi, dword ptr [esi-005B3025h]
dec eax
lea eax, dword ptr [edi+006F6244h]
push dword ptr [eax]
mov dword ptr [eax], 840DFACFh
push eax
push edi
mov eax, 0073E4F1h
push eax
dec eax
mov ecx, esp
dec eax
mov edx, edi
dec eax
mov edi, esi
mov esi, 0018C3A6h
push ebp
dec eax
mov ebp, esp
inc esp
mov ecx, dword ptr [ecx]
dec ecx
mov eax, edx
dec eax
mov edx, esi
dec eax
lea esi, dword ptr [edi+02h]
push esi
mov al, byte ptr [edi]
dec edx
mov cl, al
and al, 07h
shr cl, 00000003h
dec eax
mov ebx, FFFFFD00h
dec eax
shl ebx, cl
mov cl, al
dec eax
lea ebx, dword ptr [esp+ebx*2-00000E78h]
dec eax
and ebx, FFFFFFC0h
push 00000000h
dec eax
cmp esp, ebx
jne 00007F3F3CB9BC8Bh
push ebx
dec eax
lea edi, dword ptr [ebx+08h]
mov cl, byte ptr [esi-01h]
dec edx
mov byte ptr [edi+02h], al
mov al, cl
shr cl, 00000004h
mov byte ptr [edi+01h], cl
and al, 0Fh
mov byte ptr [edi], al
dec eax
lea ecx, dword ptr [edi-04h]
push eax
inc ecx
push edi
dec eax
lea eax, dword ptr [edi+04h]
inc ebp
xor edi, edi
inc ecx
push esi
inc ecx
mov esi, 00000001h
inc ecx
push ebp
inc ebp
xor ebp, ebp
inc ecx
push esp
push ebp
push ebx
dec eax
mov dword ptr [esp-10h], ecx
dec eax
mov dword ptr [esp-28h], eax
mov eax, 00000001h
dec eax
mov dword ptr [esp-08h], esi
dec esp
mov dword ptr [esp-18h], eax
mov ebx, eax
inc esp
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x744b040x2d4.rsrc
IMAGE_DIRECTORY_ENTRY_RESOURCE0x7420000x2b04.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x70a0000x1d970UPX1
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x744dd80x2c.rsrc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x740fb00x28UPX1
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x7410280x138UPX1
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x5b30000x0unknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
UPX10x5b40000x18e0000x18d200False0.9991264115124331data7.999803292136756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x7420000x30000x3000False0.3019205729166667data5.576902214031187IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountry
RT_ICON0x7421340x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States
RT_GROUP_ICON0x7446e00x14dataEnglishUnited States
RT_VERSION0x7446f80x2acdataEnglishUnited States
RT_MANIFEST0x7449a80x15aASCII text, with CRLF line terminatorsEnglishUnited States
DLLImport
ADVAPI32.dllLsaClose
bcrypt.dllBCryptGenRandom
CRYPT32.dllCertOpenStore
IPHLPAPI.DLLGetAdaptersAddresses
KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
ole32.dllCoInitializeEx
PSAPI.DLLGetProcessMemoryInfo
USER32.dllShowWindow
USERENV.dllGetUserProfileDirectoryW
WS2_32.dllioctlsocket
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
192.168.2.22109.71.252.45491714432831812 11/14/22-07:24:42.896816TCP2831812ETPRO TROJAN CoinMiner Known Malicious Stratum Authline (2018-07-16 8)49171443192.168.2.22109.71.252.45
192.168.2.22109.71.252.45491714432831074 11/14/22-07:24:42.896816TCP2831074ETPRO TROJAN CoinMiner Known Malicious Stratum Authline (2018-05-29 11)49171443192.168.2.22109.71.252.45
192.168.2.228.8.8.855868532016778 11/14/22-07:24:42.601249UDP2016778ET DNS Query to a *.pw domain - Likely Hostile5586853192.168.2.228.8.8.8
TimestampSource PortDest PortSource IPDest IP
Nov 14, 2022 07:24:42.685228109 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:24:42.685296059 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:24:42.685374975 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:24:42.686233044 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:24:42.686265945 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:24:42.889381886 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:24:42.892291069 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:24:42.892344952 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:24:42.894368887 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:24:42.894596100 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:24:42.896470070 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:24:42.896496058 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:24:42.896604061 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:24:43.102992058 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:24:43.103234053 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:25:43.914841890 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:25:43.914923906 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:25:44.004998922 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:25:44.229959965 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:26:44.324513912 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:26:44.324578047 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:26:44.414793015 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:26:44.638382912 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:26:56.520035028 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:26:56.745023966 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:27:56.602669954 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:27:56.602761984 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:27:56.698777914 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:27:56.950782061 CET49171443192.168.2.22109.71.252.45
Nov 14, 2022 07:28:11.388005018 CET44349171109.71.252.45192.168.2.22
Nov 14, 2022 07:28:11.647259951 CET49171443192.168.2.22109.71.252.45
TimestampSource PortDest PortSource IPDest IP
Nov 14, 2022 07:24:42.601248980 CET5586853192.168.2.228.8.8.8
Nov 14, 2022 07:24:42.669042110 CET53558688.8.8.8192.168.2.22
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Nov 14, 2022 07:24:42.601248980 CET192.168.2.228.8.8.80x7fd1Standard query (0)eu.minerpool.pwA (IP address)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Nov 14, 2022 07:24:42.669042110 CET8.8.8.8192.168.2.220x7fd1No error (0)eu.minerpool.pw107.182.129.82A (IP address)IN (0x0001)false
Nov 14, 2022 07:24:42.669042110 CET8.8.8.8192.168.2.220x7fd1No error (0)eu.minerpool.pw109.71.252.45A (IP address)IN (0x0001)false
Nov 14, 2022 07:24:42.669042110 CET8.8.8.8192.168.2.220x7fd1No error (0)eu.minerpool.pw185.10.68.123A (IP address)IN (0x0001)false
Nov 14, 2022 07:24:42.669042110 CET8.8.8.8192.168.2.220x7fd1No error (0)eu.minerpool.pw185.10.68.220A (IP address)IN (0x0001)false
Session IDSource IPSource PortDestination IPDestination PortProcess
0192.168.2.2249171109.71.252.45443C:\Users\user\Desktop\java.exe
TimestampkBytes transferredDirectionData
2022-11-14 06:24:42 UTC0OUTData Raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6c 6f 67 69 6e 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 6c 6f 67 69 6e 22 3a 22 77 65 62 6c 57 69 6e 22 2c 22 70 61 73 73 22 3a 22 22 2c 22 61 67 65 6e 74 22 3a 22 4a 61 76 61 28 54 4d 29 20 50 6c 61 74 66 6f 72 6d 20 53 45 20 38 2f 31 2e 38 2e 30 5f 31 37 31 2d 62 31 31 20 28 57 69 6e 64 6f 77 73 20 4e 54 20 36 2e 31 3b 20 57 69 6e 36 34 3b 20 78 36 34 29 20 6c 69 62 75 76 2f 31 2e 33 38 2e 30 20 6d 73 76 63 2f 32 30 31 39 22 2c 22 61 6c 67 6f 22 3a 5b 22 63 6e 2f 31 22 2c 22 63 6e 2f 32 22 2c 22 63 6e 2f 72 22 2c 22 63 6e 2f 66 61 73 74 22 2c 22 63 6e 2f 68 61 6c 66 22 2c 22 63 6e 2f 78 61 6f 22 2c 22 63 6e 2f 72 74 6f 22 2c 22 63 6e 2f 72 77 7a 22 2c 22
Data Ascii: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"weblWin","pass":"","agent":"Java(TM) Platform SE 8/1.8.0_171-b11 (Windows NT 6.1; Win64; x64) libuv/1.38.0 msvc/2019","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","
2022-11-14 06:24:43 UTC0INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 69 64 22 3a 31 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 69 64 22 3a 22 62 62 36 31 30 65 66 39 64 66 64 62 39 33 30 65 22 2c 22 6a 6f 62 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 33 31 33 66 30 62 64 63 37 39 62 30 36 39 31 62 61 33 65 31 66 38 34 34 65 36 35 31 31 63 35 31 36 34 64 36 38 64 37 32 30 64 36 31 37 36 38 36 34 66 63 34 32 39 38 36 38 64 37 32 38 62 33 39 61 62 33 64 36 33 66 37 39 38 30 35 35 30 30 30 30 30 30 62 66 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
Data Ascii: {"jsonrpc":"2.0","id":1,"error":null,"result":{"id":"bb610ef9dfdb930e","job":{"blob":"1313f0bdc79b0691ba3e1f844e6511c5164d68d720d6176864fc429868d728b39ab3d63f798055000000bf00000000000000000000000000000000000000000000000000000000000000000000000000000000000
2022-11-14 06:25:43 UTC1OUTData Raw: 7b 22 69 64 22 3a 32 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6b 65 65 70 61 6c 69 76 65 64 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 62 62 36 31 30 65 66 39 64 66 64 62 39 33 30 65 22 7d 7d 0d 0a
Data Ascii: {"id":2,"jsonrpc":"2.0","method":"keepalived","params":{"id":"bb610ef9dfdb930e"}}
2022-11-14 06:25:44 UTC1INData Raw: 7b 22 69 64 22 3a 32 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 73 74 61 74 75 73 22 3a 22 4b 45 45 50 41 4c 49 56 45 44 22 7d 7d 0a
Data Ascii: {"id":2,"jsonrpc":"2.0","error":null,"result":{"status":"KEEPALIVED"}}
2022-11-14 06:26:44 UTC1OUTData Raw: 7b 22 69 64 22 3a 33 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6b 65 65 70 61 6c 69 76 65 64 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 62 62 36 31 30 65 66 39 64 66 64 62 39 33 30 65 22 7d 7d 0d 0a
Data Ascii: {"id":3,"jsonrpc":"2.0","method":"keepalived","params":{"id":"bb610ef9dfdb930e"}}
2022-11-14 06:26:44 UTC1INData Raw: 7b 22 69 64 22 3a 33 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 73 74 61 74 75 73 22 3a 22 4b 45 45 50 41 4c 49 56 45 44 22 7d 7d 0a
Data Ascii: {"id":3,"jsonrpc":"2.0","error":null,"result":{"status":"KEEPALIVED"}}
2022-11-14 06:26:56 UTC1INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 33 31 33 62 30 62 66 63 37 39 62 30 36 31 65 61 34 32 32 36 62 65 66 39 34 66 64 31 63 38 36 63 34 62 31 35 62 38 65 31 36 33 32 33 32 62 38 30 64 32 64 39 32 34 66 32 30 30 34 62 33 36 64 63 38 65 38 30 63 64 34 31 39 65 36 66 61 30 30 30 30 30 30 62 66 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"1313b0bfc79b061ea4226bef94fd1c86c4b15b8e163232b80d2d924f2004b36dc8e80cd419e6fa000000bf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
2022-11-14 06:27:56 UTC2OUTData Raw: 7b 22 69 64 22 3a 34 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6b 65 65 70 61 6c 69 76 65 64 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 62 62 36 31 30 65 66 39 64 66 64 62 39 33 30 65 22 7d 7d 0d 0a
Data Ascii: {"id":4,"jsonrpc":"2.0","method":"keepalived","params":{"id":"bb610ef9dfdb930e"}}
2022-11-14 06:27:56 UTC2INData Raw: 7b 22 69 64 22 3a 34 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 73 74 61 74 75 73 22 3a 22 4b 45 45 50 41 4c 49 56 45 44 22 7d 7d 0a
Data Ascii: {"id":4,"jsonrpc":"2.0","error":null,"result":{"status":"KEEPALIVED"}}
2022-11-14 06:28:11 UTC2INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 33 31 33 66 61 62 66 63 37 39 62 30 36 62 61 36 33 66 62 34 38 62 61 39 66 39 32 33 34 37 39 31 34 63 37 32 38 32 64 62 30 64 31 35 36 66 37 63 34 32 39 30 31 62 65 61 39 65 65 64 34 31 36 31 32 64 39 39 38 61 35 33 62 38 62 34 39 30 30 30 30 30 30 62 66 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"1313fabfc79b06ba63fb48ba9f92347914c7282db0d156f7c42901bea9eed41612d998a53b8b49000000bf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:1
Start time:07:25:11
Start date:14/11/2022
Path:C:\Users\user\Desktop\java.exe
Wow64 process (32bit):false
Commandline:C:\Users\user\Desktop\java.exe
Imagebase:0x13fa10000
File size:1639424 bytes
MD5 hash:830EBC951EC7FE682A8917F58FDAE098
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

No disassembly