Summary | ZeroBOX

MonetarySummary.js

Category Machine Started Completed
FILE s1_win7_x6401 July 29, 2024, 4:57 p.m. July 29, 2024, 4:59 p.m.
Size 319.7KB
Type ASCII text, with very long lines, with no line terminators
MD5 8af1b69d823c1b6cb3a9a3102e73bf3a
SHA256 64d9182f517d746533f756273a6eeac60f76afc0df28c60185727a0e3df797d5
CRC32 CFFBA850
ssdeep 6144:DX6tuS+5hSA7zqZWBrfOaWH8fEaIMwOZ29Qe0+KB0Qwzo5sM6b:DKkS4bzmirfOaWH8fEaIMwOZSQe0+KB4
Yara None matched

Name Response Post-Analysis Lookup
pastie.io 172.67.162.195
IP Address Status Action
164.124.101.2 Active Moloch
172.67.162.195 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 172.67.162.195:443 -> 192.168.56.101:49168 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49170 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49173 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49171 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49184 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49183 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49191 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49197 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49196 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49211 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49176 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49215 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49199 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49224 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49204 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49235 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49205 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49255 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49216 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49264 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49236 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49265 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49243 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49292 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49253 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.101:49293 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49256 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49261 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49163 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49269 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49276 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49217 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.101:49177 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.101:49281 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49219 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49180 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49283 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49225 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49284 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49229 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49288 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49185 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.101:49237 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49187 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49308 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49304 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49200 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49311 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49201 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.101:49305 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49244 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49207 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49312 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49161 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49316 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49208 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49164 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.101:49321 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49320 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49228 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49166 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49167 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49231 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49181 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.101:49233 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49247 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49189 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49239 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49249 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49193 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49248 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49195 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49179 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49251 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49213 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49188 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49252 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49192 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49260 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49220 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49275 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49203 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49271 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49209 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49272 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49212 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49273 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.101:49221 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.101:49277 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49223 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49297 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49300 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49227 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49240 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49241 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.101:49245 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.101:49257 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49232 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49263 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49259 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49267 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49268 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49279 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49295 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49285 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49296 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49299 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49309 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49315 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49303 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49317 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49319 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49280 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49287 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49289 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49291 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49301 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49307 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.101:49313 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0
ALYac Trojan.Generic.36546867
VIPRE Trojan.Generic.36546867
Arcabit Trojan.Generic.D22DA933
ESET-NOD32 JS/Vjworm.BD
BitDefender Trojan.Generic.36546867
NANO-Antivirus Trojan.Script.Agent.jsggck
MicroWorld-eScan Trojan.Generic.36546867
Rising Worm.Vjworm/JS!8.13387 (TOPIS:E0:snZLNIzCoNJ)
Emsisoft Trojan.Generic.36546867 (B)
FireEye Trojan.Generic.36546867
Ikarus Worm.JS.Vjworm
Google Detected
MAX malware (ai score=88)
GData Trojan.Generic.36546867
huorong HEUR:Trojan/JS.Obfuscated.a
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: lhf§Kk8[å5Ç]P÷VX¨¹Á(Û8nqžq#°k­u/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 948
sent: 113
1 113 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: lhf§Kk]´*ûpOKؖ ¼Å½it÷?Âë­8nÜìy×`/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 964
sent: 113
1 113 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: 51f§Kl–ÿ7i¿ŠPÒ ë¶”Ÿœaúg©HŒ[âÉ%²ð,B  ÿ
socket: 964
sent: 58
1 58 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: lhf§Kn"`Y±Ë-Ø$y»Üu7O×Ír×3åÙ¤ƒËÏ/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1064
sent: 113
1 113 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: lhf§Kn@[Óâ9ïad/B¶M¨-Â3º =ݟG¤EÉ(|/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1064
sent: 113
1 113 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: 51f§KoðžØ›’v‘¢‹ç:͆4wrSmÛ`9ä.õ  ÿ
socket: 1064
sent: 58
1 58 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: lhf§KqKߒ¾‘"by>b›L6âp1{úE•±=àî/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1064
sent: 113
1 113 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: lhf§Kq÷™õзR¹ L#åÕ6K[Æ<詬n„fï/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1064
sent: 113
1 113 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: 51f§KrNŽB÷»ßƒÀ© 55Ü#N`š£±[È äå  ÿ
socket: 1064
sent: 58
1 58 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: lhf§KtRðt_¥Lž2´@‡xD`[PZ²Œ|/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1064
sent: 113
1 113 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: lhf§KtÇÛ1¤•´aFípÌrÊÇeLð¦ uòíëì/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1064
sent: 113
1 113 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: 51f§KuxÆGÌ£óM=ϲR+ ÕæÔ2½ô¹LøÙ  ÿ
socket: 1064
sent: 58
1 58 0

send

buffer: !
socket: 828
sent: 1
1 1 0

send

buffer: !
socket: 828
sent: 1
1 1 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0