Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
Setup.exe (PID: 6464 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: C34E8F27E5E41ACC13F476298BE901F5) more.com (PID: 6812 cmdline:
C:\Windows \SysWOW64\ more.com MD5: 03805AE7E8CBC07840108F5C80CF4973) conhost.exe (PID: 5856 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) SearchIndexer.exe (PID: 7380 cmdline:
C:\Windows \SysWOW64\ SearchInde xer.exe MD5: CF7BEFBA5E20F2F4C7851D016067B89C) WerFault.exe (PID: 7592 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 380 -s 408 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{
"C2 url": [
"pedestriankodwu.xyz",
"towerxxuytwi.xyz",
"ellaboratepwsz.xyz",
"penetratedpoopp.xyz",
"swellfrrgwwos.xyz",
"contintnetksows.shop",
"foodypannyjsud.shop",
"potterryisiw.shop",
"prettilikeopwp.shop"
],
"Build id": "long--try"
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Lowering of HIPS / PFW / Operating System Security Settings
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Module Loaded: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtSetInformationThread: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Section loaded: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_0081E300 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 PowerShell | 11 DLL Side-Loading | 211 Process Injection | 1 Masquerading | OS Credential Dumping | 1 System Time Discovery | Remote Services | Data from Local System | 1 Application Layer Protocol | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Abuse Elevation Control Mechanism | 1 Virtualization/Sandbox Evasion | LSASS Memory | 221 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 11 DLL Side-Loading | 211 Process Injection | Security Account Manager | 1 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Abuse Elevation Control Mechanism | LSA Secrets | 112 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 11 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/Crypt.XPACK.Gen | ||
100% | Joe Sandbox ML | |||
71% | ReversingLabs | Win32.Spyware.Lummastealer |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1466920 |
Start date and time: | 2024-07-03 15:16:08 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 23 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@7/8@0/0 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, WerFault.exe, WMIA DAP.exe, SIHClient.exe, SgrmBr oker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 93.184.221.240, 20 .42.73.29 - Excluded domains from analysis
(whitelisted): slscr.update.m icrosoft.com, ctldl.windowsupd ate.com.delivery.microsoft.com , wu.ec.azureedge.net, ctldl.w indowsupdate.com, time.windows .com, wu.azureedge.net, fe3cr. delivery.mp.microsoft.com, log in.live.com, bg.apr-52dd2-0503 .edgecastdns.net, cs11.wpc.v0c dn.net, blobcollector.events.d ata.trafficmanager.net, onedsb lobprdeus15.eastus.cloudapp.az ure.com, hlb.apr-52dd2-0.edgec astdns.net, umwatson.events.da ta.microsoft.com, wu-b-net.tra fficmanager.net - Execution Graph export aborted
for target Setup.exe, PID 646 4 because there are no execute d function - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: Setup.
exe
Time | Type | Description |
---|---|---|
09:17:22 | API Interceptor | |
10:37:48 | API Interceptor |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | modified |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8086568454651846 |
Encrypted: | false |
SSDEEP: | 192:y436jkeuJH2Q0BU/oBRjiqzuiF4Z24IO8XOn:pkuHsBU/wjHzuiF4Y4IO8g |
MD5: | F7858C83057882E7501493A093480EB7 |
SHA1: | 4A3B21B09D9F963A8F72809F6C8346F7475FEDC4 |
SHA-256: | D5F154989532D464BB9E068C922899038A62873285508603A6B77072DB6F9B33 |
SHA-512: | 0063D09A513937B4D43A218BFD6D06D3D8735A7D567DC7347341A83A54417813298D5464982570E8D7F7092A299125A3A37CF2BCDA81F203ECE2469834ABCCA6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26726 |
Entropy (8bit): | 2.22386555842152 |
Encrypted: | false |
SSDEEP: | 192:LkGzFtvr7OdMntl2N1cXkUV7XcY2AZ8eQ:HzFtuvNkFVPqe |
MD5: | 8C58F4CA393D25857ABDBD92B35F7826 |
SHA1: | CC87E9B57EF51E29C958B954AFACB754F9D0FB37 |
SHA-256: | C7CC401D2FA1135BDAB88E2FA1A65D0E4109BBEEDE2AE4D6A3247E934EDE7098 |
SHA-512: | A2CF70E7A01BC18E2DFAD998177323E4C489CDDEF85FD2543EC4223F553FF5EE2A257008B39E7992484DC8F9E46306E4A6F5FF7BB16253A03FCFFB0839CE29B0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6324 |
Entropy (8bit): | 3.725119004118895 |
Encrypted: | false |
SSDEEP: | 96:RSIU6o7wVetbBEN6+QzYkyQE/DTn5aM4Up89bX3sfZQ9m:R6l7wVeJBEN6JYkyFprp89bX3sf69m |
MD5: | A3225749729091D070AC43073A8F9C9F |
SHA1: | D3B20118369F21CEE7A936CF47DE9CD6729A9761 |
SHA-256: | 926581E5D5540347AE94DFD88F9C3AB30DEE1BA5DA6A7AC44991DA74226D927E |
SHA-512: | 5491CA6B239FE0B8EB4862C35CC119AEA72EFB4358FDC0A842C07AB0AFFEF89C7BF7A19202776354159090BC98A944293543225C49282FDC8E64F8B674414151 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4686 |
Entropy (8bit): | 4.485133363047952 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsEJg77aI94CCWpW8VYtYm8M4JUA+P/lFs+q81Qn3+t7KSJoYd:uIjfCI7yCD7VJJUAY/MEQnutRJoYd |
MD5: | FE23335A0A2EAB606E4347E2C550B35F |
SHA1: | 1764B4F19FAD08630D80591B6D2AC838C50FF651 |
SHA-256: | 82A0887C507C8CB76B51B0CFC84B0F3A697AC9F622C8ECCDA646892E2B74DB2E |
SHA-512: | 7AAA503EC9859245DCDA469AAC8E3BA8FBAD230E5E6E2662A969352B2D7DC99520FC36E8DD05CA7E0FDB78E8057CC6BF4EE8441E403B0BA9EEF376763A39BD80 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1264980 |
Entropy (8bit): | 7.9878393869406175 |
Encrypted: | false |
SSDEEP: | 24576:DxssDS2butUOO58es6ku1SaSbDoWnEa6g1mlO9ZHyEGZdfTKjIuZ90IfcutF:Vs3aIO6c1SlEYc8ZSECujn |
MD5: | D85456BC93BC20DE97041FB8F7F79247 |
SHA1: | D155E82D273925A86EF370C9F3FDA0A0CB1112EF |
SHA-256: | 9046BBD0BCB00410590FF77DB0766C8C26F26AFA4EB6431B4FB7D5E5AA8D00BF |
SHA-512: | C6CA930FE9F95058C05EC1C2852645C4C2C967E9423BB058633503541E09BD59BDD42B8EB4A1C11892ADF73E2774CE11E90303B01F1F31798D56E5AE23F9DE7C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | modified |
Size (bytes): | 1041050 |
Entropy (8bit): | 7.505429337534013 |
Encrypted: | false |
SSDEEP: | 12288:OwBNIeUVovhm05nFNR7wk+P8N8wfojgRsjJqSvBfIdM+Fppj2RxRK3c54O01XXi7:OwBNBmSXwdwAMRmqu+pYAayiMMRKDKf |
MD5: | 1DF0408322B0B7D75295AFAC99058C0D |
SHA1: | 0C8D1766548B98D553B6F5765D0C1623ADF8073D |
SHA-256: | 10C21623D225DD49C4A4AF409CB3C4D2B2DAFE33F73D943B34F6E6EB6C0305BD |
SHA-512: | FB56ABA5F4F8974D14E2FFECB9FD6DE7DBF5393E308AD25C36DCBF01CDFBF1015702F3388512AF9E27E4817D8D2541715A9B5E8940E0BD6AB457293235A47CF8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\more.com |
File Type: | |
Category: | modified |
Size (bytes): | 315904 |
Entropy (8bit): | 6.696220858854551 |
Encrypted: | false |
SSDEEP: | 6144:rHOqKYOqnTHw6zVlUcvkKqQAChXNDvhXqHt06vMSgsoFe:rH3KDsDJsKAC7JKt06EXFe |
MD5: | 9C25EF97C3EB8B18E9D89BD1C0FB0B3E |
SHA1: | 31B5C6D5EED4331E0D570548BAE1E4E17BB63CCF |
SHA-256: | 5B417F714BD9A10871B17CF730058187EF682F4C246687A131686E5D337125F0 |
SHA-512: | 655B903949F693D6E921BB0ED63A65AD2BB98DEE074B16F4CFED661706E81D1E33672E93F8AB65A2A606CAC2C871E02223615741ABC46A9491949CB2CB94A6F6 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.417481732991209 |
Encrypted: | false |
SSDEEP: | 6144:acifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNS5+:3i58oSWIZBk2MM6AFBko |
MD5: | 887540091B903CA3B76C5D55427D4AF6 |
SHA1: | F4CC37224204CF8FB0E3742D2056D0105081FE1F |
SHA-256: | 228DECE75BF12370F7A384FA5B7CD4C6A192EBB7F8BDBB71E29257CD8453709F |
SHA-512: | E4B67C2465CF7615052700618989B53B747E8A2BEA7F18B3FFDC8B8C4502DE0B31B2AC4CDE174B5E4D8A9EFEB65AF6E1F073048169226EE5ECB38408E3655183 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.708595290817905 |
TrID: |
|
File name: | Setup.exe |
File size: | 6'063'976 bytes |
MD5: | c34e8f27e5e41acc13f476298be901f5 |
SHA1: | 1857dfcf2bbb4e91fed3595395cc6ea1b6e5e425 |
SHA256: | 8c09b0520cd0a587ccdab5f16b202ef013d9bf3b4fc7653b5afdf480417d33f1 |
SHA512: | ccc416d96d36b792c59bdfd23c5e2e3b2c08c3498e43af7e0e5b873e0828c23fb30c1f21428fb8f984df99255d232e718422ce95acc8bba888da082f465c6709 |
SSDEEP: | 98304:vsMDHDRm8rcgEqQQ5izvWtb2ZaQ9kclxrg/bYzO6TEYJYEHjHO:RHDRLrcgEq55izvWtDaxbBOLYJYmu |
TLSH: | 82563812B386C96BE16141F1392CE6AA005DB9320B75C8CBF2C14F5F2574AEB6672F17 |
File Content Preview: | MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......'Ezlc$.?c$.?c$.?.B.>D$.?.B.>.$.?...?b$.?1L.>x$.?1L.>.$.?1L.>E$.?.B.>b$.?.B.>D$.?.B.>D$.?c$.?.%.?.M.>a$.?.M.>.$.?.M.?b$.?c$.?b$. |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x6ecdad |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x650168E0 [Wed Sep 13 07:46:40 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 8d56c23948c3cf94c3e1df460ac1d81c |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | F6A44C3675A46BC86A016417105762C1 |
Thumbprint SHA-1: | 7C9C6E22B13E3A435852D4B9EBFC6450F0FA3827 |
Thumbprint SHA-256: | 1EA0CBC94CC5AD5A288F32DAEBA6EAAA4F84BE905E33C709F76B7FBEEEFBC7F4 |
Serial: | 0BBE02C8838FBF02AB56EDABB1E34C19 |
Instruction |
---|
call 00007F91DCE00830h |
jmp 00007F91DCDFF10Fh |
mov ecx, dword ptr [ebp-0Ch] |
mov dword ptr fs:[00000000h], ecx |
pop ecx |
pop edi |
pop edi |
pop esi |
pop ebx |
mov esp, ebp |
pop ebp |
push ecx |
ret |
mov ecx, dword ptr [ebp-10h] |
xor ecx, ebp |
call 00007F91DCDFDE9Dh |
jmp 00007F91DCDFF270h |
mov ecx, dword ptr [ebp-14h] |
xor ecx, ebp |
call 00007F91DCDFDE8Ch |
jmp 00007F91DCDFF25Fh |
push eax |
push dword ptr fs:[00000000h] |
lea eax, dword ptr [esp+0Ch] |
sub esp, dword ptr [esp+0Ch] |
push ebx |
push esi |
push edi |
mov dword ptr [eax], ebp |
mov ebp, eax |
mov eax, dword ptr [00856944h] |
xor eax, ebp |
push eax |
push dword ptr [ebp-04h] |
mov dword ptr [ebp-04h], FFFFFFFFh |
lea eax, dword ptr [ebp-0Ch] |
mov dword ptr fs:[00000000h], eax |
ret |
push eax |
push dword ptr fs:[00000000h] |
lea eax, dword ptr [esp+0Ch] |
sub esp, dword ptr [esp+0Ch] |
push ebx |
push esi |
push edi |
mov dword ptr [eax], ebp |
mov ebp, eax |
mov eax, dword ptr [00856944h] |
xor eax, ebp |
push eax |
mov dword ptr [ebp-10h], eax |
push dword ptr [ebp-04h] |
mov dword ptr [ebp-04h], FFFFFFFFh |
lea eax, dword ptr [ebp-0Ch] |
mov dword ptr fs:[00000000h], eax |
ret |
push eax |
push dword ptr fs:[00000000h] |
lea eax, dword ptr [esp+0Ch] |
sub esp, dword ptr [esp+0Ch] |
push ebx |
push esi |
push edi |
mov dword ptr [eax], ebp |
mov ebp, eax |
mov eax, dword ptr [00856944h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x453fd8 | 0x154 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x474000 | 0x136fa1 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x5c5800 | 0x2f68 | .reloc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x5ab000 | 0x2fdcc | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x3f6140 | 0x54 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x3f6238 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x3f6198 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x395000 | 0x508 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x393786 | 0x393800 | f061065962c59fa6461e3bce05726a8a | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x395000 | 0xc0c7c | 0xc0e00 | bed6ef4fc442514d906fd92b173aaa09 | False | 0.2947142842676604 | data | 4.7365920152246375 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x456000 | 0x1ca20 | 0x9e00 | 49895d7cca3372e21af66f67b2c233e7 | False | 0.17711629746835442 | data | 4.925239385536749 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
_RDATA | 0x473000 | 0x20 | 0x200 | a713a886e740eebbf93d8e0fe58b9918 | False | 0.046875 | data | 0.14736507530476972 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x474000 | 0x136fa1 | 0x137000 | 343ebc82a7a1802d661d947f2c5e2faf | False | 0.9864584380024116 | data | 7.983199896322195 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x5ab000 | 0x2fdbc | 0x2fe00 | 6ded2b408c00b77f236d0f0b924f6889 | False | 0.4907188315926893 | data | 6.639278525890994 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
CI | 0x474274 | 0x134d54 | PNG image data, 1536 x 2163, 8-bit/color RGB, non-interlaced | English | United States | 0.9942522048950195 |
REGISTRY | 0x5a8fc8 | 0xc | ASCII text, with CRLF line terminators | English | United States | 1.6666666666666667 |
REGISTRY | 0x5a8fd4 | 0x2eb | ASCII text, with CRLF line terminators | Chinese | Taiwan | 0.42704149933065594 |
TYPELIB | 0x5a92c0 | 0x17e0 | data | English | United States | 0.4162303664921466 |
RT_STRING | 0x5aaaa0 | 0x3e | data | English | United States | 0.6451612903225806 |
RT_RCDATA | 0x5aaae0 | 0x10 | data | Chinese | China | 1.5625 |
RT_VERSION | 0x5aaaf0 | 0x334 | data | English | United States | 0.4317073170731707 |
RT_MANIFEST | 0x5aae24 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
POWRPROF.dll | CallNtPowerInformation |
AVRT.dll | AvSetMmThreadCharacteristicsW, AvRevertMmThreadCharacteristics |
WINMM.dll | timeKillEvent, timeSetEvent, timeGetDevCaps, timeEndPeriod, timeBeginPeriod |
WTSAPI32.dll | WTSEnumerateSessionsW, WTSFreeMemory, WTSQueryUserToken |
USERENV.dll | DestroyEnvironmentBlock, CreateEnvironmentBlock |
KERNEL32.dll | FlushFileBuffers, ReadFile, WriteFile, PeekNamedPipe, DecodePointer, RaiseException, InitializeCriticalSectionEx, DeleteCriticalSection, GetCurrentDirectoryW, CreateThread, SetThreadPriority, TerminateThread, GetExitCodeThread, ResumeThread, GetCurrentProcessId, GetCurrentThreadId, GetCommandLineW, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetModuleHandleW, LoadLibraryExW, LoadResource, SizeofResource, FindResourceW, SetDllDirectoryW, GetEnvironmentVariableW, HeapDestroy, HeapAlloc, HeapReAlloc, HeapFree, HeapSize, GetProcessHeap, LocalFree, FormatMessageW, GetPrivateProfileStringW, GetPrivateProfileSectionNamesW, CreateDirectoryW, GetFileAttributesW, LocalAlloc, lstrcmpW, GetSystemTimes, FormatMessageA, GetWindowsDirectoryW, FindResourceExW, LockResource, SetThreadExecutionState, GetFileAttributesExW, WritePrivateProfileStringW, SetWaitableTimer, CancelWaitableTimer, WaitForMultipleObjects, CreateWaitableTimerW, DeleteFileW, SetEnvironmentVariableW, GetFullPathNameW, FileTimeToSystemTime, SystemTimeToTzSpecificLocalTime, GetFileType, GetDriveTypeW, VirtualQuery, GetModuleHandleExW, ExitThread, RtlUnwind, UnregisterWaitEx, QueryDepthSList, InterlockedFlushSList, InterlockedPushEntrySList, InterlockedPopEntrySList, ReleaseSemaphore, VirtualFree, VirtualProtect, VirtualAlloc, GetVersionExW, OutputDebugStringW, GetTickCount64, QueryPerformanceFrequency, QueryPerformanceCounter, GetModuleFileNameA, CreateEventW, ResetEvent, SetEvent, lstrcmpiW, SetThreadAffinityMask, GetCurrentThread, TerminateProcess, GetLastError, DuplicateHandle, WaitForSingleObject, CloseHandle, GetModuleFileNameW, FreeLibrary, WideCharToMultiByte, MultiByteToWideChar, GetModuleHandleA, GetTickCount, GetSystemInfo, GetCurrentProcess, LoadLibraryW, GetProcAddress, Sleep, ExitProcess, GetStdHandle, GetFileSizeEx, GetConsoleMode, ReadConsoleW, GetDateFormatW, FreeLibraryAndExitThread, GetThreadTimes, UnregisterWait, RegisterWaitForSingleObject, GetProcessAffinityMask, GetNumaHighestNodeNumber, DeleteTimerQueueTimer, ChangeTimerQueueTimer, CreateTimerQueueTimer, GetLogicalProcessorInformation, GetThreadPriority, SignalObjectAndWait, CreateTimerQueue, InitializeSListHead, GetStartupInfoW, IsDebuggerPresent, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetLocaleInfoW, LCMapStringW, CompareStringW, GetCPInfo, GetSystemTimeAsFileTime, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, SetLastError, EncodePointer, AcquireSRWLockShared, AcquireSRWLockExclusive, ReleaseSRWLockShared, ReleaseSRWLockExclusive, SwitchToThread, WaitForSingleObjectEx, GetStringTypeW, AreFileApisANSI, SetFilePointerEx, SetEndOfFile, GetFileInformationByHandle, FindNextFileW, FindFirstFileExW, FindClose, TryEnterCriticalSection, CreateFileW, GetTimeFormatW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetConsoleCP, SetStdHandle, GetTimeZoneInformation, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, RemoveDirectoryW |
USER32.dll | CreateWindowExW, TranslateMessage, DispatchMessageW, RegisterPowerSettingNotification, PostThreadMessageW, DefWindowProcW, PostQuitMessage, RegisterClassExW, DestroyWindow, ShowWindow, CharUpperW, CharNextW, UpdateWindow, MessageBoxW, LoadCursorW, LoadIconW, RegisterDeviceNotificationW, UnregisterDeviceNotification, wsprintfW, LoadStringW, MessageBoxA, GetMessageW |
GDI32.dll | GetObjectW, DeleteObject |
ADVAPI32.dll | RegisterServiceCtrlHandlerW, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, SetNamedSecurityInfoW, RegCloseKey, RegCreateKeyExA, RegOpenKeyExA, RegQueryInfoKeyA, RegQueryInfoKeyW, RegQueryValueExA, RegQueryValueExW, RegSetValueExW, BuildTrusteeWithSidW, GetNamedSecurityInfoW, GetAce, FreeSid, EqualSid, DeleteAce, AllocateAndInitializeSid, CreateProcessAsUserW, RegEnumValueW, StartServiceW, StartServiceCtrlDispatcherW, SetServiceStatus, OpenServiceW, OpenSCManagerW, DeleteService, CreateServiceW, ControlService, CloseServiceHandle, ChangeServiceConfigW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, ReportEventW, RegisterEventSourceW, DeregisterEventSource, RegCreateKeyExW, RegOpenKeyExW |
ole32.dll | CoRevokeClassObject, CoAddRefServerProcess, CoRegisterClassObject, CoUninitialize, CoInitializeEx, CLSIDFromProgID, CoReleaseServerProcess, CoInitializeSecurity, StringFromGUID2, CoTaskMemAlloc, CoTaskMemRealloc, CoTaskMemFree, StringFromCLSID, CLSIDFromString, PropVariantClear, CoCreateInstance, CoResumeClassObjects |
OLEAUT32.dll | SysAllocString, VarUI4FromStr, LoadTypeLib, LoadRegTypeLib, RegisterTypeLib, GetErrorInfo, UnRegisterTypeLib, SysStringByteLen, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayGetElement, VariantInit, SysFreeString, VariantClear, SysStringLen |
WS2_32.dll | WSAStartup, WSACleanup, WSAGetLastError, setsockopt, htonl, inet_addr, socket, send, recv, htons, connect, closesocket, inet_pton |
CRYPT32.dll | CertCloseStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetNameStringW, CryptMsgGetParam, CryptMsgClose, CryptQueryObject |
SHLWAPI.dll | PathFileExistsW, StrCpyNW, PathFileExistsA |
pdh.dll | PdhOpenQueryW, PdhGetFormattedCounterValue, PdhAddEnglishCounterW, PdhCollectQueryData, PdhCloseQuery |
WINTRUST.dll | WinVerifyTrust |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States | |
Chinese | Taiwan | |
Chinese | China |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 09:16:59 |
Start date: | 03/07/2024 |
Path: | C:\Users\user\Desktop\Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x530000 |
File size: | 6'063'976 bytes |
MD5 hash: | C34E8F27E5E41ACC13F476298BE901F5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 09:17:01 |
Start date: | 03/07/2024 |
Path: | C:\Windows\SysWOW64\more.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe50000 |
File size: | 24'576 bytes |
MD5 hash: | 03805AE7E8CBC07840108F5C80CF4973 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 3 |
Start time: | 09:17:01 |
Start date: | 03/07/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 09:17:16 |
Start date: | 03/07/2024 |
Path: | C:\Windows\SysWOW64\SearchIndexer.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5e0000 |
File size: | 711'680 bytes |
MD5 hash: | CF7BEFBA5E20F2F4C7851D016067B89C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 17 |
Start time: | 09:17:23 |
Start date: | 03/07/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5d0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |