Windows
Analysis Report
QtWebEngineProcess.exe
Overview
General Information
Detection
Score: | 15 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
Analysis Advice
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior |
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis |
- System is w10x64_ra
OUTLOOK.EXE (PID: 4056 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\root\ Office16\O UTLOOK.EXE " /PIM NoE mail MD5: CA3FDE8329DE07C95897DB0D828545CD)
QtWebEngineProcess.exe (PID: 6392 cmdline:
C:\Users\u ser\Deskto p\QtWebEng ineProcess .exe MD5: 7897711AA4FD891040BA37F4D8724F51)
- cleanup
- • Compliance
- • Networking
- • Spam, unwanted Advertisements and Ransom Demands
- • System Summary
- • Malware Analysis System Evasion
Click to jump to signature section
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Spam, unwanted Advertisements and Ransom Demands |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File Volume queried: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Masquerading | OS Credential Dumping | 2 System Information Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
52.109.32.24 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
192.229.221.95 | unknown | United States | 15133 | EDGECASTUS | false | |
20.123.141.233 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false |
Joe Sandbox Version: | 37.0.0 Beryl |
Analysis ID: | 18420 |
Start date and time: | 2023-03-14 05:19:57 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 16s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip) |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 1 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | QtWebEngineProcess.exe |
Detection: | CLEAN |
Classification: | clean15.rans.winEXE@1/2@0/3 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, WM IADAP.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 40.126.32.134, 20. 190.160.17, 20.190.160.14, 40. 126.32.140, 40.126.32.74, 40.1 26.32.76, 20.190.160.20, 20.19 0.160.22 - Excluded domains from analysis
(whitelisted): prdv6a.aadg.ms identity.com, login.live.com, www.tm.v6.a.prd.aadg.trafficma nager.net, ctldl.windowsupdate .com, login.msa.msidentity.com , www.tm.lg.prod.aadmsa.traffi cmanager.net
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
52.109.32.24 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
192.229.221.95 | Get hash | malicious | HTMLPhisher | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
MICROSOFT-CORP-MSN-AS-BLOCKUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
EDGECASTUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Process: | C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 4096 |
Entropy (8bit): | 4.068637921876865 |
Encrypted: | false |
SSDEEP: | 24:gu9t6vX1v71kvVivOZivWcivcnivjvRs0xhqiUqFvpRsTHH+y2z/nbGLvczQ4hsa:P9tJxvq+3FBtcUH |
MD5: | 3B513F4BB1B5A7BA2E6C158ADCD2326A |
SHA1: | 972EC44F530C3E8C9A027C9A0B7A33C319277B25 |
SHA-256: | 38C6241C84674397BF72CA5BB7FAB39338697A7DA054C7BBC215709F33AFD537 |
SHA-512: | 4ABA5070CDE5D5EE7F23FD1E6FA307EB57418928264130E5ECC6257D278CA240698DF15DF9EE0EF5A1A61B40D170E580FE8D081D8DFF17AE49BDB3F331DCEEDE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 5139 |
Entropy (8bit): | 1.90154035285902 |
Encrypted: | false |
SSDEEP: | 24:Kse/8reSGHYYYMLZoj2FGh9Ez31sUbe/89MtvaMKlvq+cQ2W:KsGSGrLqO35be99YB |
MD5: | A14A83821D0788DA4FAB1ADDB3F699CB |
SHA1: | 65B91A291A1F7B8B0DBFFE375E9AC2B3CBA1F71B |
SHA-256: | FE34211D4C2F006A4ACFCE7E607BCAE61FB7F87A9F347C74E9855B79FE51B1A7 |
SHA-512: | 213890FB649FBFD95C401936BDB537F76B49E6DF1D123B49E4FF33B14B6346B25D2B3D25CE1416FDB5ED66AE1B5BAD8F95AD4077980073C22FF929C89690AA7F |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.612773933378107 |
TrID: |
|
File name: | QtWebEngineProcess.exe |
File size: | 673464 |
MD5: | 7897711aa4fd891040ba37f4d8724f51 |
SHA1: | 494183a477ad46408c99656985cdae2b12b473b6 |
SHA256: | 95b29ab9336eeb9753f7da309d16c5520fe919b7925cef545e50aae5eb06777a |
SHA512: | e1c3872729e663bb0bca22b046b3040d0edcf605a11c86bbc0c1b974927bf843f4156d8ef9955b509e6cd767407e9ebeadd90c0ba722b07ec52a4f552119f2dc |
SSDEEP: | 12288:qmozcFr5FITb4ro32B+W7ARNUfmD3QrWRCae:McFrHIbqs2B+W76NKmze |
TLSH: | 8AE46C6BB66801E8D1BBD17DC6535537E3B1780A17A087CB03A0D6A62F1BAE45E3F311 |
File Content Preview: | MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......g,B.#M,E#M,E#M,E*5.E5M,E...E$M,Eq%(D)M,Eq%/D M,Eq%-D'M,E.$%D"M,E#M,E.M,Eq%)D.M,E7&*D!M,E7&-D;M,E.$-D&M,E#M-EOO,E.$)D:O,E.$(D?M, |
Icon Hash: | 00828e8e8686b000 |
Entrypoint: | 0x140080ae0 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x620CCDCD [Wed Feb 16 10:11:25 2022 UTC] |
TLS Callbacks: | 0x400702d0, 0x1, 0x4007a4e0, 0x1, 0x40080670, 0x1, 0x400805c0, 0x1 |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 2 |
File Version Major: | 5 |
File Version Minor: | 2 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 2 |
Import Hash: | a1676b2415b16f0ce2e4683463cc9b04 |
Signature Valid: | true |
Signature Issuer: | CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 995A3C6D21E0A48565F5C8C46A2CEB06 |
Thumbprint SHA-1: | 90428E109ABEDF45AD44F384D0B79FA8780F1B78 |
Thumbprint SHA-256: | 03B597AC34A5E2AED78C12E3293811ED2744201B2F066C9E6B5D63B32FB29F0F |
Serial: | 0D36AB0805BA9450220F865C58918F52 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007FCEE0C1CF30h |
dec eax |
add esp, 28h |
jmp 00007FCEE0C1C82Fh |
int3 |
int3 |
dec eax |
mov dword ptr [esp+10h], ebx |
dec eax |
mov dword ptr [esp+18h], esi |
push edi |
dec eax |
sub esp, 10h |
xor eax, eax |
mov dword ptr [0001C04Dh], 00000002h |
xor ecx, ecx |
mov dword ptr [0001C03Dh], 00000001h |
cpuid |
inc esp |
mov eax, ecx |
xor edi, edi |
inc esp |
mov ecx, ebx |
inc ecx |
xor eax, 6C65746Eh |
inc ecx |
xor ecx, 756E6547h |
inc esp |
mov edx, edx |
mov esi, eax |
xor ecx, ecx |
lea eax, dword ptr [edi+01h] |
inc ebp |
or ecx, eax |
cpuid |
inc ecx |
xor edx, 49656E69h |
mov dword ptr [esp], eax |
inc ebp |
or ecx, edx |
mov dword ptr [esp+04h], ebx |
inc esp |
mov ebx, ecx |
mov dword ptr [esp+08h], ecx |
mov dword ptr [esp+0Ch], edx |
jne 00007FCEE0C1CA02h |
dec eax |
or dword ptr [0001BFF8h], FFFFFFFFh |
and eax, 0FFF3FF0h |
cmp eax, 000106C0h |
je 00007FCEE0C1C9DAh |
cmp eax, 00020660h |
je 00007FCEE0C1C9D3h |
cmp eax, 00020670h |
je 00007FCEE0C1C9CCh |
add eax, FFFCF9B0h |
cmp eax, 20h |
jnbe 00007FCEE0C1C9D6h |
dec eax |
mov ecx, 00010001h |
add dword ptr [eax], eax |
add byte ptr [eax], al |
dec eax |
bt ecx, eax |
jnc 00007FCEE0C1C9C6h |
inc esp |
mov eax, dword ptr [0003228Dh] |
inc ecx |
or eax, 01h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x96a70 | 0xd40 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x977b0 | 0x168 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xba000 | 0x7c8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0xb3000 | 0x6798 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xa2a00 | 0x1cb8 | .data |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xbb000 | 0xa5c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x90100 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x90138 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x90000 | 0x100 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x82000 | 0xa10 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x8041c | 0x80600 | False | 0.4736489776046738 | data | 6.533874697191123 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x82000 | 0x1841a | 0x18600 | False | 0.37341746794871794 | data | 5.629164444939546 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x9b000 | 0x17e88 | 0x1e00 | False | 0.20052083333333334 | data | 3.539269403689708 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0xb3000 | 0x6798 | 0x6800 | False | 0.49361478365384615 | data | 5.83831506305241 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0xba000 | 0x7c8 | 0x800 | False | 0.4658203125 | data | 4.861340094108417 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xbb000 | 0xa5c | 0xc00 | False | 0.4225260416666667 | data | 5.136811462753458 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_VERSION | 0xba0a0 | 0x2f8 | data | English | United States |
RT_MANIFEST | 0xba398 | 0x42c | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1008), with CRLF line terminators | English | United States |
DLL | Import |
---|---|
Qt5Core.dll | ?Windows8_1@QOperatingSystemVersion@@2V1@B, ?compare@QOperatingSystemVersion@@CAHAEBV1@0@Z, ?current@QOperatingSystemVersion@@SA?AV1@XZ, ?setFileName@QLibrary@@QEAAXAEBVQString@@@Z, ?load@QLibrary@@QEAA_NXZ, ?resolve@QLibrary@@QEAAP6AXXZPEBD@Z, ??1QLibrary@@UEAA@XZ, ??0QLibrary@@QEAA@PEAVQObject@@@Z, ??1QString@@QEAA@XZ, ?qErrnoWarning@@YAXHPEBDZZ, ?warning@QMessageLogger@@QEBAXPEBDZZ, ??0QMessageLogger@@QEAA@PEBDH0@Z, ??1QCoreApplication@@UEAA@XZ, ??0QCoreApplication@@QEAA@AEAHPEAPEADH@Z |
USER32.dll | CloseDesktop, CloseWindowStation, CreateDesktopW, GetThreadDesktop, CreateWindowStationW, SetProcessWindowStation, GetProcessWindowStation, GetUserObjectInformationW |
ADVAPI32.dll | RegQueryValueExW, EventRegister, EventUnregister, EventWrite, RegCreateKeyExW, RegOpenKeyExW, RegDisablePredefinedCache, RegCloseKey, SetThreadToken, CreateProcessAsUserW, InitializeSid, GetTokenInformation, SetTokenInformation, SetEntriesInAclW, GetSecurityInfo, SetSecurityInfo, AccessCheck, EqualSid, FreeSid, GetAce, ImpersonateLoggedOnUser, IsValidSid, MapGenericMask, RevertToSelf, GetNamedSecurityInfoW, OpenProcessToken, CreateRestrictedToken, DuplicateToken, DuplicateTokenEx, LookupPrivilegeValueW, GetKernelObjectSecurity, GetLengthSid, GetSecurityDescriptorSacl, SetKernelObjectSecurity, ConvertSidToStringSidW, ConvertStringSidToSidW, ConvertStringSecurityDescriptorToSecurityDescriptorW, SystemFunction036, CopySid, CreateWellKnownSid, GetSidSubAuthority |
KERNEL32.dll | RtlLookupFunctionEntry, UnhandledExceptionFilter, IsProcessorFeaturePresent, GetStartupInfoW, InitializeSListHead, IsDebuggerPresent, RtlCaptureContext, WaitForSingleObjectEx, InitializeCriticalSectionAndSpinCount, RtlVirtualUnwind, InitOnceExecuteOnce, CloseHandle, GetLastError, GetCurrentProcessId, OpenProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetLastError, LocalFree, GetModuleHandleW, GetProcAddress, DuplicateHandle, CreateIoCompletionPort, GetQueuedCompletionStatus, PostQueuedCompletionStatus, SetEvent, ResetEvent, WaitForSingleObject, CreateEventW, GetCurrentProcess, CreateThread, GetCurrentThreadId, TerminateJobObject, SetInformationJobObject, RegisterWaitForSingleObject, UnregisterWait, SetHandleInformation, GetCurrentThread, GetProcessHandleCount, GetCurrentProcessorNumber, VirtualFree, GetModuleHandleA, SetThreadAffinityMask, GetProcessHeaps, VirtualAllocEx, VirtualProtectEx, WriteProcessMemory, LoadLibraryW, CreateJobObjectW, AssignProcessToJobObject, QueryInformationJobObject, CreateNamedPipeW, DebugBreak, lstrlenW, HeapSetInformation, ReleaseSRWLockExclusive, TryAcquireSRWLockExclusive, CreateFileMappingW, MapViewOfFile, UnmapViewOfFile, WideCharToMultiByte, SearchPathW, GetCurrentDirectoryW, GetThreadId, CreateRemoteThread, CreateProcessW, ProcessIdToSessionId, GetFileType, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SignalObjectAndWait, CreateMutexW, TerminateProcess, FreeLibrary, HeapDestroy, GetTickCount, GetUserDefaultLangID, GetUserDefaultLCID, GetUserDefaultLocaleName, EnumSystemLocalesEx, UnregisterWaitEx, CreateFileW, GetFileAttributesW, GetLongPathNameW, QueryDosDeviceW, ReadProcessMemory, VirtualFreeEx, Sleep, AcquireSRWLockExclusive, QueryPerformanceCounter, QueryPerformanceFrequency, GetVersionExW, GetNativeSystemInfo, GetProductInfo, IsWow64Process, WriteFile, OutputDebugStringA, GetLocalTime, GetModuleFileNameW, FormatMessageA, VirtualQuery, InitializeProcThreadAttributeList, DeleteProcThreadAttributeList, UpdateProcThreadAttribute, GetSystemTimeAsFileTime, QueryThreadCycleTime, ExpandEnvironmentStringsW, GetCommandLineW, LoadLibraryExW, GetModuleHandleExW, TlsGetValue, GetThreadPriority, GetProcessTimes, SetCurrentDirectoryW, K32QueryWorkingSetEx, SetThreadPriority, RtlCaptureStackBackTrace, SetUnhandledExceptionFilter, TlsAlloc, TlsSetValue, TlsFree, RaiseException |
ole32.dll | CoTaskMemFree |
Qt5WebEngineCore.dll | ?staticSandboxInterfaceInfo@QtWebEngineCore@@YAPEAUSandboxInterfaceInfo@sandbox@@PEAU23@@Z, ?processMain@QtWebEngineCore@@YAHHPEAPEBD@Z |
MSVCP140.dll | ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z, ?tellp@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ, ?_Throw_C_error@std@@YAXH@Z, _Mtx_unlock, _Mtx_lock, ??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@, ??_7ios_base@std@@6B@, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Ios_base_dtor@ios_base@std@@CAXPEAV12@@Z, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?width@ios_base@std@@QEAA_J_J@Z, ?width@ios_base@std@@QEBA_JXZ, ?flags@ios_base@std@@QEBAHXZ, ?good@ios_base@std@@QEBA_NXZ, ?_Xout_of_range@std@@YAXPEBD@Z, ?_Xlength_error@std@@YAXPEBD@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z |
VCRUNTIME140.dll | memcmp, __std_exception_destroy, memset, _purecall, memcpy, memmove, __std_exception_copy, __CxxFrameHandler3, __C_specific_handler, memchr, strchr, strstr, _CxxThrowException, __std_terminate |
api-ms-win-crt-heap-l1-1-0.dll | free, malloc, realloc, _callnewh, _set_new_mode |
api-ms-win-crt-runtime-l1-1-0.dll | _exit, _cexit, terminate, _errno, _seh_filter_exe, _get_narrow_winmain_command_line, _crt_atexit, _register_onexit_function, _initterm, _initterm_e, exit, _c_exit, _register_thread_local_exe_atexit_callback, strerror, _set_app_type, _initialize_onexit_table, _configure_narrow_argv, abort, _invalid_parameter_noinfo_noreturn, _initialize_narrow_environment |
api-ms-win-crt-string-l1-1-0.dll | _wcsnicmp, _wcsdup, _wcsicmp, isxdigit, strncpy, wcscmp |
api-ms-win-crt-stdio-l1-1-0.dll | __p__commode, _set_fmode, __stdio_common_vsscanf, __stdio_common_vfprintf, __acrt_iob_func, fwrite, fflush, __stdio_common_vswprintf, __stdio_common_vsnprintf_s, _write, __stdio_common_vsprintf, __stdio_common_vsnwprintf_s |
api-ms-win-crt-math-l1-1-0.dll | log, ceil, exp, round, floor, __setusermatherr, _dtest |
api-ms-win-crt-environment-l1-1-0.dll | getenv |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
SHELL32.dll | CommandLineToArgvW |
WINMM.dll | timeGetTime |
Name | Ordinal | Address |
---|---|---|
GetHandleVerifier | 1 | 0x14004fdd0 |
IsSandboxedProcess | 2 | 0x1400351d0 |
TargetConfigureOPMProtectedOutput | 3 | 0x14002d0c0 |
TargetConfigureOPMProtectedOutput64 | 4 | 0x140041700 |
TargetCreateNamedPipeW | 5 | 0x140027690 |
TargetCreateNamedPipeW64 | 6 | 0x140041730 |
TargetCreateOPMProtectedOutputs | 7 | 0x14002d260 |
TargetCreateOPMProtectedOutputs64 | 8 | 0x140041790 |
TargetCreateProcessA | 9 | 0x14002fa60 |
TargetCreateProcessA64 | 10 | 0x1400417c0 |
TargetCreateProcessW | 11 | 0x14002fd20 |
TargetCreateProcessW64 | 12 | 0x140041830 |
TargetCreateThread | 13 | 0x14002ff30 |
TargetCreateThread64 | 14 | 0x1400418a0 |
TargetDestroyOPMProtectedOutput | 15 | 0x14002d3d0 |
TargetDestroyOPMProtectedOutput64 | 16 | 0x1400418e0 |
TargetEnumDisplayDevicesA | 17 | 0x14002d480 |
TargetEnumDisplayDevicesA64 | 18 | 0x1400418f0 |
TargetEnumDisplayMonitors | 19 | 0x14002d490 |
TargetEnumDisplayMonitors64 | 20 | 0x140041920 |
TargetGdiDllInitialize | 21 | 0x14002d5d0 |
TargetGdiDllInitialize64 | 22 | 0x140041950 |
TargetGetCertificate | 23 | 0x14002d5e0 |
TargetGetCertificate64 | 24 | 0x140041970 |
TargetGetCertificateByHandle | 25 | 0x14002d5f0 |
TargetGetCertificateByHandle64 | 26 | 0x1400419a0 |
TargetGetCertificateSize | 27 | 0x14002d600 |
TargetGetCertificateSize64 | 28 | 0x1400419d0 |
TargetGetCertificateSizeByHandle | 29 | 0x14002d610 |
TargetGetCertificateSizeByHandle64 | 30 | 0x1400419f0 |
TargetGetMonitorInfoA | 31 | 0x14002d620 |
TargetGetMonitorInfoA64 | 32 | 0x140041a10 |
TargetGetMonitorInfoW | 33 | 0x14002d710 |
TargetGetMonitorInfoW64 | 34 | 0x140041a30 |
TargetGetOPMInformation | 35 | 0x14002d7c0 |
TargetGetOPMInformation64 | 36 | 0x140041a50 |
TargetGetOPMRandomNumber | 37 | 0x14002d970 |
TargetGetOPMRandomNumber64 | 38 | 0x140041a70 |
TargetGetStockObject | 39 | 0x14002d480 |
TargetGetStockObject64 | 40 | 0x140041a90 |
TargetGetSuggestedOPMProtectedOutputArraySize | 41 | 0x14002da40 |
TargetGetSuggestedOPMProtectedOutputArraySize64 | 42 | 0x140041aa0 |
TargetNtCreateEvent | 43 | 0x14003d4b0 |
TargetNtCreateEvent64 | 44 | 0x140041ac0 |
TargetNtCreateFile | 45 | 0x140020540 |
TargetNtCreateFile64 | 46 | 0x140041af0 |
TargetNtCreateKey | 47 | 0x140031b10 |
TargetNtCreateKey64 | 48 | 0x140041b70 |
TargetNtCreateSection | 49 | 0x14003c2c0 |
TargetNtCreateSection64 | 50 | 0x140041bc0 |
TargetNtMapViewOfSection | 51 | 0x14003df00 |
TargetNtMapViewOfSection64 | 52 | 0x140041c00 |
TargetNtOpenEvent | 53 | 0x14003d670 |
TargetNtOpenEvent64 | 54 | 0x140041c70 |
TargetNtOpenFile | 55 | 0x1400208b0 |
TargetNtOpenFile64 | 56 | 0x140041c90 |
TargetNtOpenKey | 57 | 0x140031e80 |
TargetNtOpenKey64 | 58 | 0x140041cd0 |
TargetNtOpenKeyEx | 59 | 0x140031ed0 |
TargetNtOpenKeyEx64 | 60 | 0x140041cf0 |
TargetNtOpenProcess | 61 | 0x140030110 |
TargetNtOpenProcess64 | 62 | 0x140041d20 |
TargetNtOpenProcessToken | 63 | 0x140030270 |
TargetNtOpenProcessToken64 | 64 | 0x140041d50 |
TargetNtOpenProcessTokenEx | 65 | 0x140030380 |
TargetNtOpenProcessTokenEx64 | 66 | 0x140041d70 |
TargetNtOpenThread | 67 | 0x1400304b0 |
TargetNtOpenThread64 | 68 | 0x140041da0 |
TargetNtOpenThreadToken | 69 | 0x140029e00 |
TargetNtOpenThreadToken64 | 70 | 0x140041dd0 |
TargetNtOpenThreadTokenEx | 71 | 0x140029e70 |
TargetNtOpenThreadTokenEx64 | 72 | 0x140041e00 |
TargetNtQueryAttributesFile | 73 | 0x140020ba0 |
TargetNtQueryAttributesFile64 | 74 | 0x140041e30 |
TargetNtQueryFullAttributesFile | 75 | 0x140020d80 |
TargetNtQueryFullAttributesFile64 | 76 | 0x140041e50 |
TargetNtSetInformationFile | 77 | 0x140020f60 |
TargetNtSetInformationFile64 | 78 | 0x140041e70 |
TargetNtSetInformationThread | 79 | 0x140029ee0 |
TargetNtSetInformationThread64 | 80 | 0x140041ea0 |
TargetNtUnmapViewOfSection | 81 | 0x14003e130 |
TargetNtUnmapViewOfSection64 | 82 | 0x140041ed0 |
TargetRegisterClassW | 83 | 0x14002d5d0 |
TargetRegisterClassW64 | 84 | 0x140041ef0 |
TargetSetOPMSigningKeyAndSequenceNumbers | 85 | 0x14002db50 |
TargetSetOPMSigningKeyAndSequenceNumbers64 | 86 | 0x140041f00 |
g_handles_to_close | 87 | 0x14009ccf8 |
g_interceptions | 88 | 0x14009ce60 |
g_nt | 89 | 0x14009cf30 |
g_originals | 90 | 0x14009cd10 |
g_shared_IPC_size | 91 | 0x14009cff8 |
g_shared_delayed_integrity_level | 92 | 0x14009b000 |
g_shared_delayed_mitigations | 93 | 0x14009d080 |
g_shared_policy_size | 94 | 0x14009d000 |
g_shared_section | 95 | 0x14009cf20 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Download Network PCAP: filtered – full
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 14, 2023 05:21:04.630521059 CET | 49702 | 80 | 192.168.2.3 | 192.229.221.95 |
Mar 14, 2023 05:21:04.649045944 CET | 80 | 49702 | 192.229.221.95 | 192.168.2.3 |
Mar 14, 2023 05:21:04.649338961 CET | 49702 | 80 | 192.168.2.3 | 192.229.221.95 |
Mar 14, 2023 05:21:13.855590105 CET | 80 | 49708 | 192.229.221.95 | 192.168.2.3 |
Mar 14, 2023 05:21:13.861793995 CET | 49708 | 80 | 192.168.2.3 | 192.229.221.95 |
Mar 14, 2023 05:21:18.027111053 CET | 80 | 49717 | 192.229.221.95 | 192.168.2.3 |
Mar 14, 2023 05:21:18.027281046 CET | 49717 | 80 | 192.168.2.3 | 192.229.221.95 |
Mar 14, 2023 05:21:19.255917072 CET | 80 | 49723 | 192.229.221.95 | 192.168.2.3 |
Mar 14, 2023 05:21:19.258234024 CET | 49723 | 80 | 192.168.2.3 | 192.229.221.95 |
Mar 14, 2023 05:22:06.837876081 CET | 49721 | 443 | 192.168.2.3 | 20.123.141.233 |
Mar 14, 2023 05:22:06.838041067 CET | 49723 | 80 | 192.168.2.3 | 192.229.221.95 |
Mar 14, 2023 05:22:06.838049889 CET | 49718 | 443 | 192.168.2.3 | 52.109.32.24 |
Mar 14, 2023 05:22:06.856497049 CET | 80 | 49723 | 192.229.221.95 | 192.168.2.3 |
Mar 14, 2023 05:22:06.856662035 CET | 49723 | 80 | 192.168.2.3 | 192.229.221.95 |
Mar 14, 2023 05:22:06.868139982 CET | 443 | 49718 | 52.109.32.24 | 192.168.2.3 |
Mar 14, 2023 05:22:06.868235111 CET | 49718 | 443 | 192.168.2.3 | 52.109.32.24 |
Mar 14, 2023 05:22:06.868582964 CET | 443 | 49721 | 20.123.141.233 | 192.168.2.3 |
Mar 14, 2023 05:22:06.868674994 CET | 49721 | 443 | 192.168.2.3 | 20.123.141.233 |
Mar 14, 2023 05:22:12.892400980 CET | 49717 | 80 | 192.168.2.3 | 192.229.221.95 |
Mar 14, 2023 05:22:12.910794020 CET | 80 | 49717 | 192.229.221.95 | 192.168.2.3 |
Mar 14, 2023 05:22:12.910883904 CET | 49717 | 80 | 192.168.2.3 | 192.229.221.95 |
Mar 14, 2023 05:22:15.291599035 CET | 80 | 49708 | 192.229.221.95 | 192.168.2.3 |
Mar 14, 2023 05:22:15.291752100 CET | 49708 | 80 | 192.168.2.3 | 192.229.221.95 |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 05:20:31 |
Start date: | 14/03/2023 |
Path: | C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6674c0000 |
File size: | 41778000 bytes |
MD5 hash: | CA3FDE8329DE07C95897DB0D828545CD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Target ID: | 1 |
Start time: | 05:20:32 |
Start date: | 14/03/2023 |
Path: | C:\Users\user\Desktop\QtWebEngineProcess.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7cbaa0000 |
File size: | 673464 bytes |
MD5 hash: | 7897711AA4FD891040BA37F4D8724F51 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |