Edit tour

Windows Analysis Report
PSemuX-7z2201-x64_686356.exe

Overview

General Information

Sample name:PSemuX-7z2201-x64_686356.exe
Analysis ID:1354807
MD5:4c429162a2ff252feae81d485ee83ed4
SHA1:9d97515b3f7ccf3f790a00e229b3bb85278e0779
SHA256:05c2b596bd45efb00333097363872047f6cb67f2e9aae91ee600ab916f6fa80b
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Enables debug privileges
JA3 SSL client fingerprint seen in connection with other malware
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: PSemuX-7z2201-x64_686356.exe, 00000000.00000000.2061283961.00000000013F3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_c3c0a1fb-c
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: certificate valid
Source: unknownHTTPS traffic detected: 104.26.6.197:443 -> 192.168.2.5:49710 version: TLS 1.2
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewJA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /44A6538B354E964A/58465704911/6F981813D58FB801/70188202322?6D6E5385A14D8AFE1701882023 HTTP/1.1Host: highinstaller.comUser-Agent: NSIS_InetLoad (Mozilla)Accept: */*
Source: unknownDNS traffic detected: queries for: highinstaller.com
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: http://ocsps.ssl.com0
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: http://ocsps.ssl.com0?
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: PSemuX-7z2201-x64_686356.exe, 00000000.00000003.2230928870.000000000166C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://highinstaller.com/44A6538B354E964A/58465704911/6F981813D58FB801/70188202322?6D6E5385A14D8AFE
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: https://www.ssl.com/repository0
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownHTTPS traffic detected: 104.26.6.197:443 -> 192.168.2.5:49710 version: TLS 1.2
Source: PSemuX-7z2201-x64_686356.exe, 00000000.00000000.2061351176.000000000144A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7z.sfx.exe, vs PSemuX-7z2201-x64_686356.exe
Source: PSemuX-7z2201-x64_686356.exeBinary or memory string: OriginalFilename7z.sfx.exe, vs PSemuX-7z2201-x64_686356.exe
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean1.winEXE@1/2@1/2
Source: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeFile created: C:\Users\user\AppData\Roaming\7zipJump to behavior
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PSemuX-7z2201-x64_686356.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExW\/AddDllDirectoryh1h2h3%10s %512s %u %10s %512s %u "%64[^"]" %u %urt%s %s %u %s %s %u "%d%02d%02d %02d:%02d:%02d" %u %d
Source: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeFile read: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeJump to behavior
Source: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
Source: 7-Zip Help.lnk.0.drLNK file: ..\..\..\..\..\7zip\7-zip.chm
Source: 7-Zip File Manager.lnk.0.drLNK file: ..\..\..\..\..\7zip\7zFM.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: certificate valid
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: PSemuX-7z2201-x64_686356.exeStatic file information: File size 15006952 > 1048576
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0xc91800
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: PSemuX-7z2201-x64_686356.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\7-ZipJump to behavior
Source: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\7-Zip\7-Zip Help.lnkJump to behavior
Source: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\7-Zip\7-Zip File Manager.lnkJump to behavior
Source: PSemuX-7z2201-x64_686356.exe, 00000000.00000003.2230928870.000000000166C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: PSemuX-7z2201-x64_686356.exe, 00000000.00000003.2073821372.000000000167C000.00000004.00000020.00020000.00000000.sdmp, PSemuX-7z2201-x64_686356.exe, 00000000.00000003.2073603501.0000000001679000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllT!u
Source: PSemuX-7z2201-x64_686356.exe, 00000000.00000003.2230928870.000000000166C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exeProcess token adjusted: DebugJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid Accounts2
Command and Scripting Interpreter
1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
Non-Application Layer Protocol
SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
Domain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
Application Layer Protocol
Data Encrypted for ImpactDNS ServerEmail Addresses
Local AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Information Discovery
Distributed Component Object ModelInput CaptureTraffic Duplication1
Ingress Tool Transfer
Data DestructionVirtual Private ServerEmployee Names
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1354807 Sample: PSemuX-7z2201-x64_686356.exe Startdate: 06/12/2023 Architecture: WINDOWS Score: 1 8 highinstaller.com 2->8 5 PSemuX-7z2201-x64_686356.exe 8 5 2->5         started        process3 dnsIp4 10 highinstaller.com 104.26.6.197, 443, 49710 CLOUDFLARENETUS United States 5->10 12 127.0.0.1 unknown unknown 5->12

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsps.ssl.com0?0%URL Reputationsafe
http://ocsps.ssl.com00%URL Reputationsafe
https://curl.se/docs/hsts.html0%Avira URL Cloudsafe
https://highinstaller.com/44A6538B354E964A/58465704911/6F981813D58FB801/70188202322?6D6E5385A14D8AFE0%Avira URL Cloudsafe
https://curl.se/docs/http-cookies.html0%Avira URL Cloudsafe
https://curl.se/docs/alt-svc.html0%Avira URL Cloudsafe
https://highinstaller.com/44A6538B354E964A/58465704911/6F981813D58FB801/70188202322?6D6E5385A14D8AFE17018820230%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
highinstaller.com
104.26.6.197
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://highinstaller.com/44A6538B354E964A/58465704911/6F981813D58FB801/70188202322?6D6E5385A14D8AFE1701882023false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0PSemuX-7z2201-x64_686356.exefalse
      high
      https://curl.se/docs/hsts.htmlPSemuX-7z2201-x64_686356.exefalse
      • Avira URL Cloud: safe
      unknown
      http://crls.ssl.com/ssl.com-rsa-RootCA.crl0PSemuX-7z2201-x64_686356.exefalse
        high
        http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0PSemuX-7z2201-x64_686356.exefalse
          high
          https://curl.se/docs/http-cookies.htmlPSemuX-7z2201-x64_686356.exefalse
          • Avira URL Cloud: safe
          unknown
          https://highinstaller.com/44A6538B354E964A/58465704911/6F981813D58FB801/70188202322?6D6E5385A14D8AFEPSemuX-7z2201-x64_686356.exe, 00000000.00000003.2230928870.000000000166C000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.ssl.com/repository0PSemuX-7z2201-x64_686356.exefalse
            high
            http://ocsps.ssl.com0?PSemuX-7z2201-x64_686356.exefalse
            • URL Reputation: safe
            unknown
            http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0PSemuX-7z2201-x64_686356.exefalse
              high
              http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0QPSemuX-7z2201-x64_686356.exefalse
                high
                http://ocsps.ssl.com0PSemuX-7z2201-x64_686356.exefalse
                • URL Reputation: safe
                unknown
                http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0PSemuX-7z2201-x64_686356.exefalse
                  high
                  https://curl.se/docs/alt-svc.htmlPSemuX-7z2201-x64_686356.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_PSemuX-7z2201-x64_686356.exefalse
                    high
                    http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0PSemuX-7z2201-x64_686356.exefalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.26.6.197
                      highinstaller.comUnited States
                      13335CLOUDFLARENETUSfalse
                      IP
                      127.0.0.1
                      Joe Sandbox version:38.0.0 Ammolite
                      Analysis ID:1354807
                      Start date and time:2023-12-06 17:59:31 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 6s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:5
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:PSemuX-7z2201-x64_686356.exe
                      Detection:CLEAN
                      Classification:clean1.winEXE@1/2@1/2
                      EGA Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ocsps.ssl.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: PSemuX-7z2201-x64_686356.exe
                      No simulations
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUSThank You for your interest.emlGet hashmaliciousUnknownBrowse
                      • 104.16.126.175
                      MRKU8781602.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 172.67.177.134
                      PO.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 104.21.67.152
                      MSG831006356.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 104.22.59.100
                      Revised_PO3923447.pdf.exeGet hashmaliciousFormBookBrowse
                      • 172.67.159.240
                      file.exeGet hashmaliciousFormBookBrowse
                      • 104.21.72.220
                      QUOTATION.PDF.exeGet hashmaliciousFormBookBrowse
                      • 23.227.38.74
                      Purchase_Order_#PO30086.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 172.67.177.134
                      Y97STVZCPZC12AQ-0315904351-pdf.exeGet hashmaliciousAgentTeslaBrowse
                      • 162.159.128.233
                      Signed_PO.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 172.67.177.134
                      PO_0206201.PDF.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 172.67.177.134
                      https://onelaunch.com/downloadGet hashmaliciousUnknownBrowse
                      • 104.18.23.62
                      http://mecapantincendio.itGet hashmaliciousUnknownBrowse
                      • 104.17.25.14
                      https://lp.constantcontactpages.com/ev/reg/y793q5y/lp/f6b4fe10-7884-4304-a170-ea90347851f4Get hashmaliciousUnknownBrowse
                      • 162.247.243.29
                      https://lovegemini.co.uk/fc.PDFGet hashmaliciousUnknownBrowse
                      • 104.17.3.184
                      ATT00001.htmGet hashmaliciousHTMLPhisherBrowse
                      • 1.1.1.1
                      ksbqaf .htmlGet hashmaliciousHTMLPhisherBrowse
                      • 104.17.25.14
                      https://t.co/cYottgMrB8Get hashmaliciousPhisherBrowse
                      • 172.67.177.226
                      ATT00001.htmGet hashmaliciousHTMLPhisherBrowse
                      • 104.17.25.14
                      https://content.indeed.com/Njk5LVNYSi03MTUAAAGPvBA5Y9iCQ3O82prO99h2K94Ru8_B-yEEqR8gRDx3Rho1w9vUKCSRFIyBJwLi8DCtE0_lxls=Get hashmaliciousUnknownBrowse
                      • 104.18.11.207
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      74954a0c86284d0d6e1c4efefe92b521_.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      _.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      22382_327.jsGet hashmaliciousLummaC StealerBrowse
                      • 104.26.6.197
                      fences-1.0.1.0.0-installer_t-TafY1.exeGet hashmaliciousCobaltStrikeBrowse
                      • 104.26.6.197
                      avast_vpn_online_setup.exeGet hashmaliciousMars Stealer, VidarBrowse
                      • 104.26.6.197
                      Microstub.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      Microstub.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      6UqqC9EHFA.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      baofeng15.0.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      PDFViewer_44727842.msiGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      4496tHOPrYDQuhscyVqEZcbCBRRq.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      4496cCQpJVwUDGHVYSnxwLRoEIMF.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      Chrome_update(1).jsGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      Chrome_update(1).jsGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      4496iKzQhkhlziKzdxfRihzUykrn.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      telegram_cxcLf.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      CKlO7ANp5J.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      MoQlNbG9Iu.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      http://104.156.149.33/yes/4496EOhNFImHEZOIsrnCCTmYaysV.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      xE5YAGNf32.exeGet hashmaliciousUnknownBrowse
                      • 104.26.6.197
                      No context
                      Process:C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exe
                      File Type:MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                      Category:dropped
                      Size (bytes):888
                      Entropy (8bit):2.963904264096373
                      Encrypted:false
                      SSDEEP:12:8gl0ARsXU1e/tz0/CSLWXuhKBkMESBgCNfBf4t2YZ/elFlSJm:8jvWLWehKBTfBpjqy
                      MD5:FD71B328BEF69A26080A3EE360EC1735
                      SHA1:7C735DC3B5248FE03BF2B67A098CCE4AD972EE04
                      SHA-256:48B952FC64216B625E6C620738CFC85A8C97193C661AC564400EDF329EB244F1
                      SHA-512:4A90D662FA96A70A0AA730AA166BB4765C8A39D7958C13F0CEB4FB4F0EB4B1541F152F0AD669AD63EC36E78B4E8B4D98A1BB08AA54F4D96E8841FDDED54B408B
                      Malicious:false
                      Reputation:low
                      Preview:L..................F........................................................'....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................a.l.f.o.n.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....N.1...........7zip..:............................................7.z.i.p.....Z.2...........7zFM.exe..B............................................7.z.F.M...e.x.e.............\.....\.....\.....\.....\.7.z.i.p.\.7.z.F.M...e.x.e.............}.............>.e.L.:..er.=}...............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                      Process:C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exe
                      File Type:MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                      Category:dropped
                      Size (bytes):892
                      Entropy (8bit):2.965325705818322
                      Encrypted:false
                      SSDEEP:12:8gl02sXU1e/tz0/CSLWXuhK1cq6RWUlCNfBf4t2YZ/elFlSJm:8dvWLWehKxglkjqy
                      MD5:44D122BB274045329CC731C9AB0C1829
                      SHA1:70318C04910C87A0EA4C0D9D36540C5FAB120ECC
                      SHA-256:7D048E1A89BBE833DFFAB42C8F88413CECD5E9118743B7EE725E30B8E375D48B
                      SHA-512:4126A7A635C3D4188B187D8F1C721F7B2F868E70F0698C1E6CF87A6EB9E123FA9903CB7DD7014617EB44962E74916A8F27EA915EA7BCBC564FF47F52CC5AECA5
                      Malicious:false
                      Reputation:low
                      Preview:L..................F........................................................)....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................a.l.f.o.n.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....N.1...........7zip..:............................................7.z.i.p.....\.2...........7-zip.chm.D............................................7.-.z.i.p...c.h.m.............\.....\.....\.....\.....\.7.z.i.p.\.7.-.z.i.p...c.h.m.............}.............>.e.L.:..er.=}...............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.0570215910645775
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:PSemuX-7z2201-x64_686356.exe
                      File size:15'006'952 bytes
                      MD5:4c429162a2ff252feae81d485ee83ed4
                      SHA1:9d97515b3f7ccf3f790a00e229b3bb85278e0779
                      SHA256:05c2b596bd45efb00333097363872047f6cb67f2e9aae91ee600ab916f6fa80b
                      SHA512:82b7ac00c59cb1b409559c4be8e697f5fe9005773b033931d92d359483d81890b827af3144ffc63b9fe5808c14e1aa057b9350a7c53405c267c6e24a4cf8c6cc
                      SSDEEP:393216:qtIFYL6tUPTRbaBRNOEVTLXcPDuOIUVDzQHTzrIBo9PIBo9HIBo9vIBo9IIBo9Pd:qtIFYL6tUPTRbaBRNOEVTLXcb1QHTzrc
                      TLSH:08E67FD8B253F449E3D404A1251576D84A431D357B25DAE87F8327E82A2C18AFEF1F3A
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......[.or...!...!...!...!...!.y.!...!...!/..!s.. ...!s.. ...!s.. ...!s.. ...!.y.!...!... ...!... ...!... ...!...!...!...!...!... ...
                      Icon Hash:b8868baba9aba2d8
                      Entrypoint:0x1018552
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6532818F [Fri Oct 20 13:33:03 2023 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:73f4ae5a1cdfbec53be5180e242a288b
                      Signature Valid:true
                      Signature Issuer:CN=SSL.com EV Code Signing Intermediate CA RSA R3, O=SSL Corp, L=Houston, S=Texas, C=US
                      Signature Validation Error:The operation completed successfully
                      Error Number:0
                      Not Before, Not After
                      • 28/10/2022 20:52:48 21/10/2023 17:32:41
                      Subject Chain
                      • OID.1.3.6.1.4.1.311.60.2.1.3=CA, OID.2.5.4.15=Private Organization, CN=Digital Doc Inc., SERIALNUMBER=1411858-8, O=Digital Doc Inc., L=Etobicoke, S=Ontario, C=CA
                      Version:3
                      Thumbprint MD5:C5C31184597D7BDCFB805D727F602D58
                      Thumbprint SHA-1:FA79EE1810D4CCE467D56C1B4C530947910D0847
                      Thumbprint SHA-256:5376906F26B3B498BA4FA42A74B303A4457F74FB5F52BDB57EC27DF0F2054D93
                      Serial:4CB7A2BDF02529EC744228C083B5AAE8
                      Instruction
                      call 00007F6AB06CC0A0h
                      jmp 00007F6AB06CBAAFh
                      and dword ptr [ecx+04h], 00000000h
                      mov eax, ecx
                      and dword ptr [ecx+08h], 00000000h
                      mov dword ptr [ecx+04h], 010BE868h
                      mov dword ptr [ecx], 0109817Ch
                      ret
                      push ebp
                      mov ebp, esp
                      sub esp, 0Ch
                      lea ecx, dword ptr [ebp-0Ch]
                      call 00007F6AB06CBC0Fh
                      push 010DF48Ch
                      lea eax, dword ptr [ebp-0Ch]
                      push eax
                      call 00007F6AB071CC33h
                      int3
                      jmp 00007F6AB071FF13h
                      push ebp
                      mov ebp, esp
                      and dword ptr [010E6844h], 00000000h
                      sub esp, 24h
                      or dword ptr [010E2084h], 01h
                      push 0000000Ah
                      call dword ptr [010930F4h]
                      test eax, eax
                      je 00007F6AB06CBDDFh
                      and dword ptr [ebp-10h], 00000000h
                      xor eax, eax
                      push ebx
                      push esi
                      push edi
                      xor ecx, ecx
                      lea edi, dword ptr [ebp-24h]
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      mov dword ptr [edi], eax
                      mov dword ptr [edi+04h], esi
                      mov dword ptr [edi+08h], ecx
                      xor ecx, ecx
                      mov dword ptr [edi+0Ch], edx
                      mov eax, dword ptr [ebp-24h]
                      mov edi, dword ptr [ebp-1Ch]
                      mov dword ptr [ebp-0Ch], eax
                      xor edi, 6C65746Eh
                      mov eax, dword ptr [ebp-18h]
                      xor eax, 49656E69h
                      mov dword ptr [ebp-08h], eax
                      mov eax, dword ptr [ebp-20h]
                      xor eax, 756E6547h
                      mov dword ptr [ebp-04h], eax
                      xor eax, eax
                      inc eax
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      lea ebx, dword ptr [ebp-24h]
                      mov dword ptr [ebx], eax
                      mov eax, dword ptr [ebp-04h]
                      mov dword ptr [ebx+04h], esi
                      or eax, edi
                      or eax, dword ptr [ebp-08h]
                      Programming Language:
                      • [IMP] VS2008 SP1 build 30729
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xcdfd740xdc.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xcea0000x2008.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0xe4df200x1dc8
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xced0000x2229c.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0xcd6d2c0x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xcd6d480x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0xc930000x4e8.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000xc916ad0xc91800unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0xc930000x4e6760x4e800False0.3892472382563694data5.5843990126044964IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xce20000x73400x2200False0.22518382352941177data4.51016770081089IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0xcea0000x20080x2200False0.2913602941176471data3.2668412287346413IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xced0000x2229c0x22400False0.552983861770073data6.500769652772586IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xcea8000x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.16532258064516128
                      RT_ICON0xceaae80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.32094594594594594
                      RT_DIALOG0xceb1880x1fcdataEnglishUnited States0.4704724409448819
                      RT_DIALOG0xceac380x12edataEnglishUnited States0.6225165562913907
                      RT_DIALOG0xcead680x2f4dataEnglishUnited States0.48148148148148145
                      RT_DIALOG0xceb0600x126dataEnglishUnited States0.5850340136054422
                      RT_STRING0xceb4080x3eMatlab v4 mat-file (little endian) C, numeric, rows 0, columns 0EnglishUnited States0.6774193548387096
                      RT_STRING0xceb3c00x42dataEnglishUnited States0.7121212121212122
                      RT_STRING0xceb4480x60dataEnglishUnited States0.5625
                      RT_STRING0xcebe580x30dataEnglishUnited States0.5833333333333334
                      RT_STRING0xceb4a80x208Matlab v4 mat-file (little endian) h, numeric, rows 0, columns 0EnglishUnited States0.4269230769230769
                      RT_STRING0xceb6b00xe2Matlab v4 mat-file (little endian) C, numeric, rows 0, columns 0EnglishUnited States0.43805309734513276
                      RT_STRING0xceb7980x34dataEnglishUnited States0.6538461538461539
                      RT_STRING0xceb7d00x30dataEnglishUnited States0.6041666666666666
                      RT_STRING0xceb8000x6eMatlab v4 mat-file (little endian) , numeric, rows 0, columns 0EnglishUnited States0.6818181818181818
                      RT_STRING0xceb8700x11adataEnglishUnited States0.5035460992907801
                      RT_STRING0xceb9900x6adataEnglishUnited States0.5471698113207547
                      RT_STRING0xceb3880x32dataEnglishUnited States0.58
                      RT_STRING0xceba000x1eadataEnglishUnited States0.363265306122449
                      RT_STRING0xcebbf00x156Matlab v4 mat-file (little endian) U, numeric, rows 0, columns 0EnglishUnited States0.5175438596491229
                      RT_STRING0xcebd480x56dataEnglishUnited States0.6162790697674418
                      RT_STRING0xcebda00xb6dataEnglishUnited States0.5164835164835165
                      RT_GROUP_ICON0xceac100x22dataEnglishUnited States1.0
                      RT_VERSION0xcea5500x2b0dataEnglishUnited States0.49273255813953487
                      RT_MANIFEST0xcebe880x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                      DLLImport
                      KERNEL32.dllGetCurrentThreadId, InitializeCriticalSectionAndSpinCount, SetFilePointer, SetEnvironmentVariableW, MultiByteToWideChar, GetStartupInfoW, GetLogicalDriveStringsA, MoveFileW, FileTimeToSystemTime, InitializeSListHead, GetStringTypeW, GetCurrentProcess, TlsAlloc, GetSystemDirectoryW, GetUserDefaultLCID, lstrcatA, GlobalFree, GetLastError, InitializeCriticalSectionEx, SetFileAttributesW, CreateSemaphoreA, CreateEventA, IsDebuggerPresent, ReleaseSemaphore, GetFileSizeEx, LoadLibraryA, FindNextFileA, WriteConsoleW, FindFirstFileW, CreateThread, IsProcessorFeaturePresent, GetFullPathNameW, SetUnhandledExceptionFilter, SetFilePointerEx, FindClose, LocalFree, GetConsoleMode, GetCPInfo, UnhandledExceptionFilter, LeaveCriticalSection, VirtualAlloc, GlobalMemoryStatus, FormatMessageW, GetFileAttributesW, GetProcessHeap, GlobalAlloc, CreateFileW, InitializeCriticalSection, VirtualFree, TlsSetValue, VerifyVersionInfoW, LoadLibraryExW, ReleaseSRWLockExclusive, Sleep, GetDateFormatW, ResetEvent, GetTimeFormatW, MoveFileExW, CreateDirectoryA, IsValidLocale, CloseHandle, lstrlenA, GlobalUnlock, PeekNamedPipe, GetFileInformationByHandle, WaitForSingleObject, GetTickCount64, FlushFileBuffers, GetModuleFileNameW, DeleteCriticalSection, ReadFile, DeleteFileA, GlobalLock, GetTimeZoneInformation, RemoveDirectoryW, GetCommandLineA, TerminateProcess, GetVersionExA, SleepEx, GetTickCount, SetFileAttributesA, GetModuleHandleA, WaitForSingleObjectEx, GetProcAddress, CreateDirectoryW, FreeEnvironmentStringsW, HeapSize, SetEndOfFile, HeapFree, CreateFileA, RtlUnwind, FileTimeToLocalFileTime, LCMapStringEx, GetDriveTypeW, GetACP, EncodePointer, GetSystemTimeAsFileTime, GetOEMCP, GetModuleFileNameA, GetModuleHandleW, TlsGetValue, SetLastError, GetCurrentThread, GetStdHandle, SystemTimeToTzSpecificLocalTime, TlsFree, GetFileSize, QueryPerformanceCounter, WaitForMultipleObjects, EnumSystemLocalesW, GetSystemWow64DirectoryW, ReadConsoleW, AreFileApisANSI, GetProcessAffinityMask, SetPriorityClass, EnterCriticalSection, CompareFileTime, GetLocaleInfoW, IsValidCodePage, VerSetConditionMask, GetFileAttributesA, FindFirstFileA, GetCurrentDirectoryW, WideCharToMultiByte, RemoveDirectoryA, CompareStringW, GetCommandLineW, FreeLibrary, GetEnvironmentVariableA, GetLogicalDriveStringsW, HeapReAlloc, MoveFileA, lstrlenW, GetCurrentProcessId, FindFirstFileExW, ExitThread, DecodePointer, GetFileAttributesExW, FormatMessageA, HeapAlloc, lstrcatW, DeleteFileW, SetFileTime, LCMapStringW, LoadLibraryW, AcquireSRWLockExclusive, GetModuleHandleExW, SetEvent, GetSystemInfo, ExitProcess, WriteFile, QueryPerformanceFrequency, GetConsoleOutputCP, SetStdHandle, GetFileType, RaiseException, GetEnvironmentStringsW, FindNextFileW, FreeLibraryAndExitThread, GetCurrentDirectoryA
                      USER32.dllGetWindowTextLengthA, DialogBoxParamA, EmptyClipboard, CharUpperA, CheckDlgButton, EndDialog, SetClipboardData, GetMonitorInfoA, GetWindowLongA, SetFocus, IsDlgButtonChecked, CharUpperW, PostMessageA, LoadIconA, GetKeyState, SetTimer, ScreenToClient, OpenClipboard, SystemParametersInfoA, MonitorFromWindow, SetCursor, SetWindowTextW, MoveWindow, LoadStringA, MapDialogRect, DialogBoxParamW, KillTimer, SetWindowTextA, SetWindowLongA, MessageBoxW, wsprintfA, LoadCursorA, GetWindowTextW, GetWindowTextA, InvalidateRect, LoadStringW, ShowWindow, GetDlgItem, EnableWindow, SendMessageW, GetWindowRect, GetParent, MessageBoxA, CloseClipboard, GetWindowTextLengthW, SendMessageA, GetFocus
                      ADVAPI32.dllCryptDestroyKey, CryptGetHashParam, RegSetValueExW, CryptImportKey, CryptCreateHash, RegOpenKeyExW, CryptEncrypt, CryptDestroyHash, RegCreateKeyExW, CryptAcquireContextW, CryptHashData, CryptReleaseContext, RegCloseKey
                      SHELL32.dllSHGetMalloc, CommandLineToArgvW, SHGetFileInfoA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetSpecialFolderPathW
                      ole32.dllCoInitialize, CoUninitialize, CoCreateInstance, OleInitialize
                      OLEAUT32.dllVariantClear, SysAllocStringLen, SysAllocString, SysStringLen, SysFreeString
                      bcrypt.dllBCryptGenRandom
                      CRYPT32.dllCertEnumCertificatesInStore, CertFindExtension, CertFreeCertificateChainEngine, CryptDecodeObjectEx, CertCloseStore, CertGetNameStringW, CryptQueryObject, CertFindCertificateInStore, CertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateContext, CertCreateCertificateChainEngine, CertAddCertificateContextToStore, PFXImportCertStore, CertOpenStore, CryptStringToBinaryW
                      WLDAP32.dll
                      WS2_32.dllgetpeername, sendto, recvfrom, getaddrinfo, socket, ioctlsocket, gethostname, getsockopt, send, WSAEventSelect, WSAIoctl, WSACloseEvent, WSAWaitForMultipleEvents, WSAResetEvent, freeaddrinfo, closesocket, WSAGetLastError, ntohs, WSASetLastError, WSAStartup, WSACleanup, htons, setsockopt, WSACreateEvent, __WSAFDIsSet, select, accept, bind, connect, getsockname, htonl, listen, recv, WSAEnumNetworkEvents
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States

                      Download Network PCAP: filteredfull

                      • Total Packets: 9
                      • 443 (HTTPS)
                      • 53 (DNS)
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 6, 2023 18:00:24.717495918 CET49710443192.168.2.5104.26.6.197
                      Dec 6, 2023 18:00:24.717552900 CET44349710104.26.6.197192.168.2.5
                      Dec 6, 2023 18:00:24.717632055 CET49710443192.168.2.5104.26.6.197
                      Dec 6, 2023 18:00:24.757014036 CET49710443192.168.2.5104.26.6.197
                      Dec 6, 2023 18:00:24.757052898 CET44349710104.26.6.197192.168.2.5
                      Dec 6, 2023 18:00:24.975259066 CET44349710104.26.6.197192.168.2.5
                      Dec 6, 2023 18:00:24.975459099 CET49710443192.168.2.5104.26.6.197
                      Dec 6, 2023 18:00:24.979105949 CET49710443192.168.2.5104.26.6.197
                      Dec 6, 2023 18:00:24.979125023 CET44349710104.26.6.197192.168.2.5
                      Dec 6, 2023 18:00:24.979465961 CET44349710104.26.6.197192.168.2.5
                      Dec 6, 2023 18:00:24.989775896 CET49710443192.168.2.5104.26.6.197
                      Dec 6, 2023 18:00:25.036739111 CET44349710104.26.6.197192.168.2.5
                      Dec 6, 2023 18:00:25.280441046 CET44349710104.26.6.197192.168.2.5
                      Dec 6, 2023 18:00:25.280745983 CET44349710104.26.6.197192.168.2.5
                      Dec 6, 2023 18:00:25.280843973 CET49710443192.168.2.5104.26.6.197
                      Dec 6, 2023 18:00:25.288577080 CET49710443192.168.2.5104.26.6.197
                      Dec 6, 2023 18:00:25.288615942 CET44349710104.26.6.197192.168.2.5
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 6, 2023 18:00:24.563206911 CET5334953192.168.2.51.1.1.1
                      Dec 6, 2023 18:00:24.666577101 CET53533491.1.1.1192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Dec 6, 2023 18:00:24.563206911 CET192.168.2.51.1.1.10x93d5Standard query (0)highinstaller.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Dec 6, 2023 18:00:24.666577101 CET1.1.1.1192.168.2.50x93d5No error (0)highinstaller.com104.26.6.197A (IP address)IN (0x0001)false
                      Dec 6, 2023 18:00:24.666577101 CET1.1.1.1192.168.2.50x93d5No error (0)highinstaller.com172.67.73.193A (IP address)IN (0x0001)false
                      Dec 6, 2023 18:00:24.666577101 CET1.1.1.1192.168.2.50x93d5No error (0)highinstaller.com104.26.7.197A (IP address)IN (0x0001)false
                      • highinstaller.com
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.549710104.26.6.1974432516C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exe
                      TimestampBytes transferredDirectionData
                      2023-12-06 17:00:24 UTC177OUTGET /44A6538B354E964A/58465704911/6F981813D58FB801/70188202322?6D6E5385A14D8AFE1701882023 HTTP/1.1
                      Host: highinstaller.com
                      User-Agent: NSIS_InetLoad (Mozilla)
                      Accept: */*
                      2023-12-06 17:00:25 UTC542INData Raw: 48 54 54 50 2f 31 2e 31 20 32 30 30 20 4f 4b 0d 0a 44 61 74 65 3a 20 57 65 64 2c 20 30 36 20 44 65 63 20 32 30 32 33 20 31 37 3a 30 30 3a 32 35 20 47 4d 54 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 0d 0a 54 72 61 6e 73 66 65 72 2d 45 6e 63 6f 64 69 6e 67 3a 20 63 68 75 6e 6b 65 64 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 63 6c 6f 73 65 0d 0a 43 46 2d 43 61 63 68 65 2d 53 74 61 74 75 73 3a 20 44 59 4e 41 4d 49 43 0d 0a 52 65 70 6f 72 74 2d 54 6f 3a 20 7b 22 65 6e 64 70 6f 69 6e 74 73 22 3a 5b 7b 22 75 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 61 2e 6e 65 6c 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 5c 2f 72 65 70 6f 72 74 5c 2f 76 33 3f 73 3d 6b 39 69 62 5a 4d 6c 4f 4f 74
                      Data Ascii: HTTP/1.1 200 OKDate: Wed, 06 Dec 2023 17:00:25 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=k9ibZMlOOt
                      2023-12-06 17:00:25 UTC38INData Raw: 32 30 0d 0a 36 46 35 33 43 36 43 36 43 33 37 37 35 44 35 30 46 37 46 42 45 31 42 31 35 44 35 33 32 34 45 34 0d 0a
                      Data Ascii: 206F53C6C6C3775D50F7FBE1B15D5324E4
                      2023-12-06 17:00:25 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      050100s020406080100

                      Click to jump to process

                      050100s0.00102030MB

                      Click to jump to process

                      • File
                      • Registry
                      • Network

                      Click to dive into process behavior distribution

                      Target ID:0
                      Start time:18:00:22
                      Start date:06/12/2023
                      Path:C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\PSemuX-7z2201-x64_686356.exe
                      Imagebase:0x760000
                      File size:15'006'952 bytes
                      MD5 hash:4C429162A2FF252FEAE81D485EE83ED4
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true
                      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                      No disassembly