Summary | ZeroBOX

eh.txt

Antivirus
Category Machine Started Completed
FILE s1_win7_x6402 July 3, 2021, 9:06 a.m. July 3, 2021, 9:09 a.m.
Size 4.7KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 8bc1da669ee262bf1e25dee032525abd
SHA256 4ae2f55348b9e7935c0296ce0ec7d96ebc23c70a9bac334362cc724d571b14c6
CRC32 0BBF98DC
ssdeep 96:8OJoskmMmU+u1ViXyzQX1f0gUe3X87J3aLQ4UtX4QLoBf/ETQjOfjjepUc/:/Jos3Mmxuj0yzCWIn8oZUx7DMAjCpUc/
Yara
  • Antivirus - Contains references to security software

Name Response Post-Analysis Lookup
d2js2viceajwla.cloudfront.net
AAAA 2600:9000:2139:e00:11:6feb:6f80:93a1
AAAA 2600:9000:2139:ae00:11:6feb:6f80:93a1
AAAA 2600:9000:2139:7a00:11:6feb:6f80:93a1
AAAA 2600:9000:2139:8000:11:6feb:6f80:93a1
AAAA 2600:9000:2139:4a00:11:6feb:6f80:93a1
AAAA 2600:9000:2139:ec00:11:6feb:6f80:93a1
AAAA 2600:9000:2139:6200:11:6feb:6f80:93a1
AAAA 2600:9000:2139:4000:11:6feb:6f80:93a1
99.86.202.75
aus.thunderbird.net 99.86.202.75
prod.balrog.prod.cloudops.mozgcp.net 35.244.181.201
d2js2viceajwla.cloudfront.net 99.86.202.75
aus5.mozilla.org 35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net 35.244.181.201
IP Address Status Action
164.124.101.2 Active Moloch
35.244.181.201 Active Moloch
99.86.144.100 Active Moloch
99.86.144.46 Active Moloch
99.86.144.61 Active Moloch
99.86.144.82 Active Moloch
99.86.202.125 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49322
99.86.202.125:443
C=US, O=Let's Encrypt, CN=R3 CN=thunderbird.net dd:92:a0:f3:c5:f2:3a:c7:42:66:30:75:8a:b3:b3:03:6b:8c:df:9d
TLS 1.2
192.168.56.102:49323
35.244.181.201:443
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA C=US, ST=California, L=Mountain View, O=Mozilla Corporation, CN=aus5.mozilla.org 37:1a:8a:6e:ae:e7:b7:ae:1f:a9:c0:87:53:e5:a0:94:ef:0b:de:0c

Time & API Arguments Status Return Repeated

__exception__

stacktrace:
CtfImeIsIME+0x36fd DllUnregisterServer-0xf9d9 msctf+0x2d08c @ 0x766fd08c
TF_GetGlobalCompartment+0x3dfd CtfImeIsIME-0x344 msctf+0x2964b @ 0x766f964b
TF_GetInputScope+0xf65 CtfImeDestroyThreadMgr-0x25ae msctf+0x14d6b @ 0x766e4d6b
TF_GetInputScope+0x3176 CtfImeDestroyThreadMgr-0x39d msctf+0x16f7c @ 0x766e6f7c
CtfImeDestroyInputContext+0x280 TF_CanUninitialize-0x1c msctf+0x1e825 @ 0x766ee825
TF_GetInputScope+0x21fc CtfImeDestroyThreadMgr-0x1317 msctf+0x16002 @ 0x766e6002
TF_GetInputScope+0x21e2 CtfImeDestroyThreadMgr-0x1331 msctf+0x15fe8 @ 0x766e5fe8
TF_GetInputScope+0xbdd CtfImeDestroyThreadMgr-0x2936 msctf+0x149e3 @ 0x766e49e3
TF_GetInputScope+0x1c1a CtfImeDestroyThreadMgr-0x18f9 msctf+0x15a20 @ 0x766e5a20
RtlIsCurrentThreadAttachExempt+0x5f TpCheckTerminateWorker-0x37 ntdll+0x39a91 @ 0x773d9a91
LdrShutdownProcess+0x97 RtlDetectHeapLeaks-0x1bb ntdll+0x58f10 @ 0x773f8f10
RtlExitUserProcess+0x74 LdrShutdownProcess-0x1d ntdll+0x58e5c @ 0x773f8e5c
ExitProcess+0x15 TerminateThread-0xa kernel32+0x17a25 @ 0x75737a25
wscript+0x2fbd @ 0xe72fbd
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: ff 51 0c 8b 45 fc 89 be 8c 04 00 00 3b c7 74 25
exception.symbol: TF_GetCompatibleKeyboardLayout+0x5885 TF_IsCtfmonRunning-0xfd3 msctf+0x43ef4
exception.instruction: call dword ptr [ecx + 0xc]
exception.module: MSCTF.dll
exception.exception_code: 0xc0000005
exception.offset: 278260
exception.address: 0x76713ef4
registers.esp: 4585752
registers.edi: 0
registers.eax: 11112384
registers.ebp: 4585780
registers.edx: 1
registers.ebx: 0
registers.esi: 2491184
registers.ecx: 1915696604
1 0 0
host 99.86.144.100
host 99.86.144.46
host 99.86.144.61
host 99.86.144.82