Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Set-up.exe

Overview

General Information

Sample name:Set-up.exe
Analysis ID:1579083
MD5:cf434586b9c7be034528e12c545e0718
SHA1:7bd4c423ca38d0146f52ba0fca62e5d2940eb8c0
SHA256:d10d8c2f7fddee36a66d334f129f2cecf2539034c55bea2218e285e85d9193fc
Tags:exeuser-aachum
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
HTTP GET or POST without a user agent
IP address seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • Set-up.exe (PID: 7508 cmdline: "C:\Users\user\Desktop\Set-up.exe" MD5: CF434586B9C7BE034528E12C545E0718)
    • WerFault.exe (PID: 8116 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7508 -s 736 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Set-up.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.1% probability
Source: Set-up.exe, 00000000.00000002.3149050194.0000000000EFD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_f21c39eb-b
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: Joe Sandbox ViewIP Address: 98.85.100.80 98.85.100.80
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: global trafficDNS traffic detected: DNS query: httpbin.org
Source: global trafficDNS traffic detected: DNS query: home.sevkx17vs.top
Source: Set-up.exeString found in binary or memory: http://.css
Source: Set-up.exeString found in binary or memory: http://.jpg
Source: Set-up.exeString found in binary or memory: http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzBXk17
Source: Set-up.exe, 00000000.00000002.3149032436.0000000000EFC000.00000004.00000001.01000000.00000003.sdmp, Set-up.exe, 00000000.00000002.3151001488.00000000018EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzBXk1733202266
Source: Set-up.exe, 00000000.00000002.3151001488.00000000018EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzBXk17332022666963
Source: Set-up.exe, 00000000.00000002.3149032436.0000000000EFC000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzBXk1733202266http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzB
Source: Set-up.exe, 00000000.00000002.3151001488.00000000018EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzBXk1733202266osts
Source: Set-up.exeString found in binary or memory: http://html4/loose.dtd
Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ip
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ipbefore
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: C:\Users\user\Desktop\Set-up.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7508 -s 736
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeBinary string: Lntdll.dllNtCreateFileNtDeviceIoControlFileNtCancelIoFileEx\Device\Afd
Source: classification engineClassification label: mal56.evad.winEXE@2/5@14/1
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7508
Source: C:\Users\user\Desktop\Set-up.exeMutant created: \Sessions\1\BaseNamedObjects\My_mutex
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c199e997-ddff-420e-a8fd-df02c7ab2254Jump to behavior
Source: Set-up.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Set-up.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Set-up.exeReversingLabs: Detection: 34%
Source: Set-up.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectorysystem_win32.c@
Source: Set-up.exeString found in binary or memory: in-addr.arpa
Source: Set-up.exeString found in binary or memory: 8L0123456789abcdefin-addr.arpaip6.arpa
Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: Set-up.exeString found in binary or memory: JM[\Unable to allocate space for channel dataFailed allocating memory for channel type nameUnable to allocate temporary space for packetWould block sending channel-open requestUnable to send channel-open requestWould blockUnexpected errorUnexpected packet sizeChannel open failure (administratively prohibited)Channel open failure (connect failed)Channel open failure (unknown channel type)Channel open failure (resource shortage)Channel open failureUnable to allocate memory for setenv packetcancel-tcpip-forwardWould block sending forward requestUnable to send global-request packet for forward listen requestauth-agent-req@openssh.comauth-agent-reqcdChannel can not be reusedUnable to allocate memory for channel-process requestWould block sending channel requestUnable to send channel requestFailed waiting for channel successUnable to complete request for channel-process-startupUnexpected packet lengthUnable to allocate memory for signal nameWould block sending window adjustUnable to send transfer-window adjustment packet, deferringtransport readwould blockWe have already closed this channelEOF has already been received, data might be ignoredFailure while draining incoming flowUnable to send channel dataUnable to send EOF, but closing channel anywayWould block sending close-channelUnable to send close-channel request, but closing anywaysessionchannel.cUnable to allocate memory for direct-tcpip connectiondirect-tcpipUnable to allocate memory for direct-streamlocal connectiondirect-streamlocal@openssh.comQR0.0.0.0tcpip-forwardWould block sending global-request packet for forward listen requestUnknownUnable to allocate memory for listener queueUnable to complete request for forward-listenWould block waiting for packetChannel not foundcdenvWould block sending setenv requestUnable to send channel-request packet for setenv requestFailed getting response for channel-setenvUnable to complete request for channel-setenvcdWould block sending auth-agent requestUnable to send auth-agent requestFailed to request auth-agentUnable to complete request for auth-agentcdterm + mode lengths too largepty-reqWould block sending pty requestUnable to send pty-request packetFailed to require the PTY packageUnable to complete request for channel request-ptywindow-changeWould block sending window-change requestUnable to send window-change packetcdUnable to allocate memory for pty-requestx11-reqMIT-MAGIC-COOKIE-1Unable to get random bytes for x11-req cookie%02XWould block sending X11-req packetUnable to send x11-req packetwaiting for x11-req response packetUnable to complete request for channel x11-reqWould block sending EOFUnable to send EOF on channelReceiving channel window has been exhausted_libssh2_transport_read() bailed out!libssh2_channel_wait_closed() invoked when channel is not in EOF stateUnable to allocate memory for signal requestsignalWould block sending signal requestUnable to send signal packetecdsa-sha2-nistp256ecdsa-sha2-nistp384ecdsa-sha2-nistp521blocksize <= siz
Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
Source: Set-up.exeString found in binary or memory: set-addPolicy
Source: Set-up.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
Source: unknownProcess created: C:\Users\user\Desktop\Set-up.exe "C:\Users\user\Desktop\Set-up.exe"
Source: C:\Users\user\Desktop\Set-up.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7508 -s 736
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: Set-up.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Set-up.exeStatic file information: File size 7894016 > 1048576
Source: Set-up.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x49ec00
Source: Set-up.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x15cc00
Source: Set-up.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x151000
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Set-up.exeStatic PE information: section name: .eh_fram
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: Set-up.exeBinary or memory string: PROCMON.EXE
Source: Set-up.exeBinary or memory string: X64DBG.EXE
Source: Set-up.exeBinary or memory string: WINDBG.EXE
Source: Set-up.exeBinary or memory string: SYSINTERNALSNUM_PROCESSORNUM_RAMNAMEALLFREEDRIVERSNUM_DISPLAYSRESOLUTION_XRESOLUTION_Y\*RECENT_FILESPROCESSESUPTIME_MINUTESC:\WINDOWS\SYSTEM32\VBOX*.DLL01VBOX_FIRSTSYSTEM\CONTROLSET001\SERVICES\VBOXSFVBOX_SECONDC:\USERS\PUBLIC\PUBLIC_CHECKWINDBG.EXEDBGWIRESHARK.EXEPROCMON.EXEX64DBG.EXEIDA.EXEDBG_SECDBG_THIRDYADROINSTALLED_APPSSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALLSOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL%D%S\%SDISPLAYNAMEAPP_NAMEINDEXCREATETOOLHELP32SNAPSHOT FAILED.
Source: Set-up.exeBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\Set-up.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Set-up.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: Amcache.hve.6.drBinary or memory string: VMware
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Set-up.exe, 00000000.00000002.3151001488.00000000018EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllPWU
Source: Set-up.exe, 00000000.00000003.1747988262.00000000016E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Y\MACHINE\SYSTEM\ControlSet001\Services\VBoxSFsion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}00000FF1CE}\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}
Source: Set-up.exeBinary or memory string: SYSINTERNALSNum_processorNum_ramnameallfreedriversNum_displaysresolution_xresolution_y\*recent_filesprocessesuptime_minutesC:\Windows\System32\VBox*.dll01vbox_firstSYSTEM\ControlSet001\Services\VBoxSFvbox_secondC:\USERS\PUBLIC\public_checkWINDBG.EXEdbgwireshark.exeprocmon.exex64dbg.exeida.exedbg_secdbg_thirdyadroinstalled_appsSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall%d%s\%sDisplayNameapp_nameindexCreateToolhelp32Snapshot failed.
Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Set-up.exe, 00000000.00000003.1747040894.0000000001913000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.6.drBinary or memory string: vmci.sys
Source: Set-up.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: VMware20,1
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\Set-up.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Set-up.exe, Set-up.exe, 00000000.00000002.3149050194.0000000000EFD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
Source: Set-up.exe, Set-up.exe, 00000000.00000002.3149050194.0000000000EFD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe
Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping121
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Remote System Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets13
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Set-up.exe34%ReversingLabsWin32.Infostealer.Tinba
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
httpbin.org
98.85.100.80
truefalse
    high
    home.sevkx17vs.top
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://httpbin.org/ipfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://curl.se/docs/hsts.htmlSet-up.exefalse
          high
          http://html4/loose.dtdSet-up.exefalse
            high
            https://httpbin.org/ipbeforeSet-up.exefalse
              high
              https://curl.se/docs/http-cookies.htmlSet-up.exefalse
                high
                http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzBXk17Set-up.exefalse
                  unknown
                  http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzBXk1733202266ostsSet-up.exe, 00000000.00000002.3151001488.00000000018EE000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzBXk17332022666963Set-up.exe, 00000000.00000002.3151001488.00000000018EE000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzBXk1733202266Set-up.exe, 00000000.00000002.3149032436.0000000000EFC000.00000004.00000001.01000000.00000003.sdmp, Set-up.exe, 00000000.00000002.3151001488.00000000018EE000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzBXk1733202266http://home.sevkx17vs.top/TYELKNoHAuZzdCMGzBSet-up.exe, 00000000.00000002.3149032436.0000000000EFC000.00000004.00000001.01000000.00000003.sdmpfalse
                          unknown
                          http://upx.sf.netAmcache.hve.6.drfalse
                            high
                            https://curl.se/docs/alt-svc.htmlSet-up.exefalse
                              high
                              http://.cssSet-up.exefalse
                                high
                                http://.jpgSet-up.exefalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  98.85.100.80
                                  httpbin.orgUnited States
                                  11351TWC-11351-NORTHEASTUSfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1579083
                                  Start date and time:2024-12-20 19:26:57 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 6m 15s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Run name:Run with higher sleep bypass
                                  Number of analysed new started processes analysed:8
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:Set-up.exe
                                  Detection:MAL
                                  Classification:mal56.evad.winEXE@2/5@14/1
                                  EGA Information:Failed
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 20.42.73.29, 172.202.163.200, 13.107.246.63, 20.190.147.12
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target Set-up.exe, PID 7508 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • VT rate limit hit for: Set-up.exe
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  98.85.100.80Set-up.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                    Set-up.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                      Set-up.exeGet hashmaliciousUnknownBrowse
                                        t3VyxF5MmA.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                          Pm81aa8zii.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                            avBx6p1FAX.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                              j6Nv9kUydV.exeGet hashmaliciousUnknownBrowse
                                                q79Pocl81P.exeGet hashmaliciousCryptbotBrowse
                                                  28PCC9oa8s.exeGet hashmaliciousUnknownBrowse
                                                    fnuFOEqg4j.exeGet hashmaliciousUnknownBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      httpbin.orgSet-up.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      Set-up.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      Set-up.exeGet hashmaliciousUnknownBrowse
                                                      • 98.85.100.80
                                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, SystemBC, zgRATBrowse
                                                      • 98.85.100.80
                                                      t3VyxF5MmA.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      KNkr78hyig.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 34.226.108.155
                                                      Pm81aa8zii.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      avBx6p1FAX.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      Tsy9P2T9yF.exeGet hashmaliciousUnknownBrowse
                                                      • 34.226.108.155
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      TWC-11351-NORTHEASTUSSet-up.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      Set-up.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      Set-up.exeGet hashmaliciousUnknownBrowse
                                                      • 98.85.100.80
                                                      nshmips.elfGet hashmaliciousMiraiBrowse
                                                      • 69.204.90.210
                                                      t3VyxF5MmA.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      Pm81aa8zii.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      avBx6p1FAX.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      nshkppc.elfGet hashmaliciousMiraiBrowse
                                                      • 98.67.105.53
                                                      mpsl.elfGet hashmaliciousMiraiBrowse
                                                      • 67.253.128.172
                                                      j6Nv9kUydV.exeGet hashmaliciousUnknownBrowse
                                                      • 98.85.100.80
                                                      No context
                                                      No context
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):65536
                                                      Entropy (8bit):0.9303911078258531
                                                      Encrypted:false
                                                      SSDEEP:192:ZinlUd30BU/oj4ZrMso5wzuiFwZ24IO8nG:Cl2EBU/ojuzuiFwY4IO8n
                                                      MD5:31B965AA1BD0BC3C701431323EBE280C
                                                      SHA1:0E5279F27C535B3EACDD72EDAEB52496B0758144
                                                      SHA-256:FC2DA8D661308D665C49CA1F57C3232F333B8746B20888513226D1DF3BD41226
                                                      SHA-512:CF36D6902E6723A8AC003BFA11CD9542E85A2D03D286BFFD4BFF82126C5058532E649E1072A34B7D43BE4C979277033B1BACC73C5B483DF08B56E74D5495A1E4
                                                      Malicious:true
                                                      Reputation:low
                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.1.9.2.9.3.7.0.1.3.6.1.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.1.9.2.9.3.7.4.5.1.1.2.5.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.b.6.b.6.d.5.0.-.f.9.b.e.-.4.f.7.8.-.a.a.f.0.-.6.3.5.9.d.5.9.9.e.1.8.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.5.5.c.8.e.a.7.-.8.4.c.d.-.4.3.d.6.-.a.7.b.7.-.d.f.b.a.6.c.6.4.8.2.6.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.t.-.u.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.5.4.-.0.0.0.1.-.0.0.1.4.-.c.3.c.0.-.8.e.e.1.0.c.5.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.7.b.a.1.5.1.0.9.b.6.9.3.2.d.7.6.c.b.3.8.f.e.0.1.d.a.1.0.a.2.2.0.0.0.0.f.f.f.f.!.0.0.0.0.7.b.d.4.c.4.2.3.c.a.3.8.d.0.1.4.6.f.5.2.b.a.0.f.c.a.6.2.e.5.d.2.9.4.0.e.b.8.c.0.!.S.e.t.-.u.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Mini DuMP crash report, 15 streams, Fri Dec 20 18:28:57 2024, 0x1205a4 type
                                                      Category:dropped
                                                      Size (bytes):50530
                                                      Entropy (8bit):2.3558200952541966
                                                      Encrypted:false
                                                      SSDEEP:384:Lqh0a9baQQi+Q2lZJZwihpdGp7/0Bgk0pLVQAwjf:LqBGQQi+Q2X7dGp7/PpLVQT
                                                      MD5:625163AD06AE14AC518935C89F31EB2C
                                                      SHA1:C66378344081C4969DF7A88928C9C0E2C9516172
                                                      SHA-256:88832ACBB00073A7BE882A9477F38CDE5FF1A0AC776DBD4C006EFA4F8970E0C8
                                                      SHA-512:213F38B1F3A4891C61CBFBE27D61B9EE734EF0657B2164A599E29BA492024611E5201E737F7B5E87284DAAA58A4D7BA26F8778190F462A44A57D293C2AE1D18E
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:MDMP..a..... .......i.eg................................................D...~/..........`.......8...........T............%..J.......................................................................................................eJ..............GenuineIntel............T.......T...(.eg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):8314
                                                      Entropy (8bit):3.693019779582074
                                                      Encrypted:false
                                                      SSDEEP:192:R6l7wVeJRZ6IZ7m6Y9kSUCgmfxb5prH89beIsfzKm:R6lXJf6I1m6YeSUCgmfxb8e7fP
                                                      MD5:04B939BD4986DFF74E2EC1BFDD5B179B
                                                      SHA1:083CCDB46E42F71AC60CB37F36AC9D0CE7367BB5
                                                      SHA-256:EAC27B9DDA48113FCE39924C0DA443D6B9E52163CB79DFADECCD7CC24F3084BE
                                                      SHA-512:5BD0B8D14288B919C7FE573C938D7ADCD05E70533B074CC8833D5A88D3C4B39B3EF71EFAEBAA657A86CDA173B1AB509D30233A606B0A8177E834A543C9BA8426
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.0.8.<./.P.i.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):4574
                                                      Entropy (8bit):4.443061444824736
                                                      Encrypted:false
                                                      SSDEEP:48:cvIwWl8zsPJg77aI9PUWpW8VYLjYm8M4JJ5FW+q8TZM4U+agl0d:uIjfxI75N7VQ2J0QM4U+ag0d
                                                      MD5:5B9FC7AAE13960E6DA053896DCAD2A53
                                                      SHA1:D74B9C9E27D139B86F5FFDC0098378CDABE15164
                                                      SHA-256:4A6B5B6EA24FC43871B949ABCD3A3508D8462E81D1A6BB1C70BC321196423AB3
                                                      SHA-512:C2232D047A5068ABACEEB26144CB989319A3C2225B181C4600B7C3476D8B6A6E03E9CE498E83C0CBE5E28D32CF9BB270F8BBDA8C001DC988D77EE47817A23A59
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="639931" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:MS Windows registry file, NT/2000 or above
                                                      Category:dropped
                                                      Size (bytes):1835008
                                                      Entropy (8bit):4.465373121480599
                                                      Encrypted:false
                                                      SSDEEP:6144:IIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNvdwBCswSbg:dXD94+WlLZMM6YFHZ+g
                                                      MD5:F75F5514E8996185A48DD62B7DC1638D
                                                      SHA1:2AD7E5CA07C5172D74A50E9AAC4338448C346E2C
                                                      SHA-256:720F4322455FDE66BE804E5CD5000867167A671B70D0A78A94841D8E1BC82B40
                                                      SHA-512:D19D57F7211211F7971B8CD8890A48D22E1E285B438EA196F352112C35CC0D2D61EA122CD2894E6540668081EBCC330F440F65FFEECC2BE27DAA0ECD95DAF453
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm&....S.................................................................................................................................................................................................................................................................................................................................................3........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                      Entropy (8bit):5.791267450868342
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.53%
                                                      • InstallShield setup (43055/19) 0.43%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:Set-up.exe
                                                      File size:7'894'016 bytes
                                                      MD5:cf434586b9c7be034528e12c545e0718
                                                      SHA1:7bd4c423ca38d0146f52ba0fca62e5d2940eb8c0
                                                      SHA256:d10d8c2f7fddee36a66d334f129f2cecf2539034c55bea2218e285e85d9193fc
                                                      SHA512:eaa0dba624ec95adda61ab00a5bb61409b7fbc2535df3e89d7133852b3cd7bea83acd6ad11c902614afb30c1d7d29df5b868ad05afefcce16b5d5074310c46cb
                                                      SSDEEP:98304:zIeD/KFR0PZvt8Prmq7i/nSR9tfKVGyz:ZSFKFAyBe9tfHG
                                                      TLSH:6D863A61EE9781F5DAC305715056B73F6E31AF009825CEB6CF90FB34C672A12EA5E218
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ng...............(..I..px..2............J...@...........................x.......y...@... ............................
                                                      Icon Hash:90cececece8e8eb0
                                                      Entrypoint:0x4014a0
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                      Time Stamp:0x674E92E6 [Tue Dec 3 05:11:02 2024 UTC]
                                                      TLS Callbacks:0x7890e0, 0x789090
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:81fb24115d5dd0de51b609f733724901
                                                      Instruction
                                                      mov dword ptr [00B55658h], 00000001h
                                                      jmp 00007FD4FC80F016h
                                                      nop
                                                      mov dword ptr [00B55658h], 00000000h
                                                      jmp 00007FD4FC80F006h
                                                      nop
                                                      sub esp, 1Ch
                                                      mov eax, dword ptr [esp+20h]
                                                      mov dword ptr [esp], eax
                                                      call 00007FD4FCB96876h
                                                      cmp eax, 01h
                                                      sbb eax, eax
                                                      add esp, 1Ch
                                                      ret
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      push ebp
                                                      mov ebp, esp
                                                      push edi
                                                      push esi
                                                      push ebx
                                                      sub esp, 1Ch
                                                      mov dword ptr [esp], 009FD000h
                                                      call dword ptr [00B579A0h]
                                                      sub esp, 04h
                                                      test eax, eax
                                                      je 00007FD4FC80F3D5h
                                                      mov ebx, eax
                                                      mov dword ptr [esp], 009FD000h
                                                      call dword ptr [00B57A14h]
                                                      mov edi, dword ptr [00B579B4h]
                                                      sub esp, 04h
                                                      mov dword ptr [00B53028h], eax
                                                      mov dword ptr [esp+04h], 009FD013h
                                                      mov dword ptr [esp], ebx
                                                      call edi
                                                      sub esp, 08h
                                                      mov esi, eax
                                                      mov dword ptr [esp+04h], 009FD029h
                                                      mov dword ptr [esp], ebx
                                                      call edi
                                                      sub esp, 08h
                                                      mov dword ptr [008A0004h], eax
                                                      test esi, esi
                                                      je 00007FD4FC80F373h
                                                      mov dword ptr [esp+04h], 00B5302Ch
                                                      mov dword ptr [esp], 00B4E104h
                                                      call esi
                                                      mov dword ptr [esp], 00401580h
                                                      call 00007FD4FC80F2C3h
                                                      lea esp, dword ptr [ebp-0Ch]
                                                      pop ebx
                                                      pop esi
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x7570000x2d90.idata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x75c0000x326d8.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x7440e00x18.rdata
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x7578100x61c.idata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x49ea7c0x49ec00864fb5085ee1b4574db5be4837fdb817unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .data0x4a00000x15ca640x15cc0004666db6d7f0eeaedb8c13ae81f6c246False0.015552195340501791dBase III DBT, version number 0, next free block index 10, 1st item "\254\311z"0.23076010737827105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rdata0x5fd0000x150f040x151000e7fd725278fee3497ee52adfb75d2641False0.4214185946772997data6.273674184307772IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .eh_fram0x74e0000x4d300x4e005b1c8a08b7f4b12175d21cc89d0e4660False0.31921073717948717data4.890102423374675IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .bss0x7530000x31800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .idata0x7570000x2d900x2e003e69c164c01d162128ddb4300315452fFalse0.36769701086956524data5.434079465623614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .CRT0x75a0000x300x200fe2a65d4187b984679c52ae93485940eFalse0.0625data0.2233456448570176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .tls0x75b0000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .reloc0x75c0000x326d80x32800679b23d1c372dff112ee9c7387d331d3False0.5063331528465347data6.655641022726191IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      DLLImport
                                                      ADVAPI32.dllCryptAcquireContextA, CryptAcquireContextW, CryptCreateHash, CryptDecrypt, CryptDestroyHash, CryptDestroyKey, CryptEnumProvidersW, CryptExportKey, CryptGenRandom, CryptGetHashParam, CryptGetProvParam, CryptGetUserKey, CryptHashData, CryptReleaseContext, CryptSetHashParam, CryptSignHashW, DeregisterEventSource, RegCloseKey, RegEnumKeyExA, RegNotifyChangeKeyValue, RegOpenKeyExA, RegOpenKeyExW, RegQueryValueExA, RegisterEventSourceW, ReportEventW, SystemFunction036
                                                      bcrypt.dllBCryptGenRandom
                                                      CRYPT32.dllCertCloseStore, CertDuplicateCertificateContext, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetCertificateContextProperty, CertGetEnhancedKeyUsage, CertGetIntendedKeyUsage, CertOpenStore, CertOpenSystemStoreA, CertOpenSystemStoreW
                                                      GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, SelectObject
                                                      gdiplus.dllGdipGetImageEncoders, GdipGetImageEncodersSize, GdiplusShutdown, GdiplusStartup
                                                      IPHLPAPI.DLLConvertInterfaceIndexToLuid, ConvertInterfaceLuidToNameA, FreeMibTable, GetAdaptersAddresses, GetBestRoute2, GetUnicastIpAddressTable, if_indextoname, if_nametoindex
                                                      KERNEL32.dllAcquireSRWLockExclusive, CancelIo, CloseHandle, CompareFileTime, ConvertFiberToThread, ConvertThreadToFiberEx, CreateEventA, CreateFiberEx, CreateFileA, CreateFileMappingA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreW, CreateThread, CreateToolhelp32Snapshot, DeleteCriticalSection, DeleteFiber, EnterCriticalSection, ExpandEnvironmentStringsA, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileW, FormatMessageW, FreeLibrary, GetACP, GetConsoleMode, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceExA, GetDriveTypeA, GetEnvironmentVariableA, GetEnvironmentVariableW, GetFileAttributesA, GetFileType, GetLastError, GetLogicalDriveStringsA, GetModuleFileNameA, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTime, GetSystemTimeAsFileTime, GetThreadLocale, GetTickCount64, GetTickCount, GetTimeZoneInformation, GetVersion, GetVersionExA, GlobalMemoryStatusEx, HeapAlloc, HeapFree, InitializeConditionVariable, InitializeCriticalSection, IsBadReadPtr, IsDBCSLeadByteEx, K32EnumProcesses, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, MapViewOfFile, MoveFileExA, MultiByteToWideChar, OpenProcess, PeekNamedPipe, PostQueuedCompletionStatus, Process32First, Process32Next, QueryFullProcessImageNameA, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleA, ReadConsoleW, ReadFile, RegisterWaitForSingleObject, ReleaseSRWLockExclusive, ReleaseSemaphore, SetConsoleMode, SetFileCompletionNotificationModes, SetHandleInformation, SetLastError, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, SleepEx, SwitchToFiber, SystemTimeToFileTime, TlsAlloc, TlsGetValue, TlsSetValue, UnmapViewOfFile, UnregisterWait, VerSetConditionMask, VerifyVersionInfoW, VirtualAlloc, VirtualFree, VirtualLock, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitNamedPipeA, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteFile, lstrlenA
                                                      msvcrt.dll__mb_cur_max, __setusermatherr, _findclose, _fullpath, _lock, _strnicmp, _unlock, getc, islower, isxdigit, localeconv, ungetc, vfprintf, _findnext, _findfirst, _open
                                                      ole32.dllCreateStreamOnHGlobal
                                                      SHELL32.dllSHGetKnownFolderPath
                                                      api-ms-win-crt-convert-l1-1-0.dllatoi, mbstowcs, strtol, strtoll, strtoul, wcstombs
                                                      api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, getenv
                                                      api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _stat64, _unlink
                                                      api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
                                                      api-ms-win-crt-locale-l1-1-0.dllsetlocale
                                                      api-ms-win-crt-math-l1-1-0.dll_fdopen
                                                      api-ms-win-crt-private-l1-1-0.dllmemchr, memcmp, memcpy, memmove, strchr, strrchr, strstr, wcsstr
                                                      api-ms-win-crt-runtime-l1-1-0.dll_set_app_type, __p___argc, __p___argv, __p___wargv, __p__acmdln, __sys_errlist, __sys_nerr, _assert, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _errno, _exit, _fpreset, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_invalid_parameter_handler, abort, exit, raise, signal, strerror
                                                      api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vsscanf, __stdio_common_vswprintf, _fileno, _fseeki64, _lseeki64, _wfopen, _write, fclose, feof, ferror, fflush, fgets, fopen, fputc, fputs, fread, fseek, ftell, fwrite, rewind, setvbuf, _write, _setmode, _read, _open, _fileno, _close
                                                      api-ms-win-crt-string-l1-1-0.dll_strlwr_s, isspace, isupper, memset, strcat, strcmp, strcpy, strcspn, strlen, strncat, strncmp, strncpy, strpbrk, strspn, tolower, wcscat, wcscmp, wcscpy, wcslen, _wcsnicmp, _stricmp, _strdup, _strdup
                                                      api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _difftime32, _difftime64, _gmtime64, _mktime64, _time32, _time64, _tzset, strftime
                                                      api-ms-win-crt-utility-l1-1-0.dll_byteswap_uint64, bsearch, qsort, rand, srand
                                                      USER32.dllCharUpperA, EnumDisplayMonitors, EnumWindows, FindWindowA, GetDC, GetProcessWindowStation, GetSystemMetrics, GetUserObjectInformationW, GetWindowTextA, MessageBoxW, ReleaseDC, SendMessageA
                                                      WS2_32.dllWSACleanup, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAGetLastError, WSAIoctl, WSAResetEvent, WSASetEvent, WSASetLastError, WSAStartup, WSAStringToAddressW, WSAWaitForMultipleEvents, __WSAFDIsSet, accept, bind, closesocket, connect, gethostbyaddr, gethostbyname, gethostname, getpeername, getservbyname, getservbyport, getsockname, getsockopt, htonl, htons, inet_addr, inet_ntoa, ioctlsocket, listen, ntohl, ntohs, recv, recvfrom, select, send, sendto, setsockopt, shutdown, socket
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 20, 2024 19:27:54.203927040 CET49731443192.168.2.498.85.100.80
                                                      Dec 20, 2024 19:27:54.203988075 CET4434973198.85.100.80192.168.2.4
                                                      Dec 20, 2024 19:27:54.204060078 CET49731443192.168.2.498.85.100.80
                                                      Dec 20, 2024 19:27:54.208131075 CET49731443192.168.2.498.85.100.80
                                                      Dec 20, 2024 19:27:54.208148956 CET4434973198.85.100.80192.168.2.4
                                                      Dec 20, 2024 19:27:55.946237087 CET4434973198.85.100.80192.168.2.4
                                                      Dec 20, 2024 19:27:55.954276085 CET49731443192.168.2.498.85.100.80
                                                      Dec 20, 2024 19:27:55.954324961 CET4434973198.85.100.80192.168.2.4
                                                      Dec 20, 2024 19:27:55.955864906 CET4434973198.85.100.80192.168.2.4
                                                      Dec 20, 2024 19:27:55.955928087 CET49731443192.168.2.498.85.100.80
                                                      Dec 20, 2024 19:27:56.000614882 CET49731443192.168.2.498.85.100.80
                                                      Dec 20, 2024 19:27:56.000842094 CET4434973198.85.100.80192.168.2.4
                                                      Dec 20, 2024 19:27:56.024969101 CET49731443192.168.2.498.85.100.80
                                                      Dec 20, 2024 19:27:56.024997950 CET4434973198.85.100.80192.168.2.4
                                                      Dec 20, 2024 19:27:56.072854996 CET49731443192.168.2.498.85.100.80
                                                      Dec 20, 2024 19:27:56.349396944 CET4434973198.85.100.80192.168.2.4
                                                      Dec 20, 2024 19:27:56.349518061 CET4434973198.85.100.80192.168.2.4
                                                      Dec 20, 2024 19:27:56.349582911 CET49731443192.168.2.498.85.100.80
                                                      Dec 20, 2024 19:27:56.350776911 CET49731443192.168.2.498.85.100.80
                                                      Dec 20, 2024 19:27:56.350800037 CET4434973198.85.100.80192.168.2.4
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 20, 2024 19:27:53.884537935 CET5052853192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:27:53.884692907 CET5052853192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:27:54.021939993 CET53505281.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:27:54.186234951 CET53505281.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:27:56.701283932 CET5053153192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:27:56.701385975 CET5053153192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:27:56.839107990 CET53505311.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:27:56.839149952 CET53505311.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:28:06.880796909 CET5053253192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:28:06.880942106 CET5053253192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:28:07.019057989 CET53505321.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:28:07.019130945 CET53505321.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:28:17.032569885 CET6127953192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:28:17.032571077 CET6127953192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:28:17.171155930 CET53612791.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:28:17.171278000 CET53612791.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:28:27.191045046 CET6246653192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:28:27.191190004 CET6246653192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:28:27.328588963 CET53624661.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:28:27.328651905 CET53624661.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:28:37.347878933 CET6406553192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:28:37.347944021 CET6406553192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:28:37.487852097 CET53640651.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:28:37.487871885 CET53640651.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:28:47.501674891 CET5826253192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:28:47.501732111 CET5826253192.168.2.41.1.1.1
                                                      Dec 20, 2024 19:28:47.639816999 CET53582621.1.1.1192.168.2.4
                                                      Dec 20, 2024 19:28:47.640675068 CET53582621.1.1.1192.168.2.4
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Dec 20, 2024 19:27:53.884537935 CET192.168.2.41.1.1.10x9a30Standard query (0)httpbin.orgA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:27:53.884692907 CET192.168.2.41.1.1.10xf8a9Standard query (0)httpbin.org28IN (0x0001)false
                                                      Dec 20, 2024 19:27:56.701283932 CET192.168.2.41.1.1.10xc0eaStandard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:27:56.701385975 CET192.168.2.41.1.1.10x1cacStandard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:28:06.880796909 CET192.168.2.41.1.1.10xdd96Standard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:06.880942106 CET192.168.2.41.1.1.10xa84fStandard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:28:17.032569885 CET192.168.2.41.1.1.10xb6adStandard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:17.032571077 CET192.168.2.41.1.1.10xfc33Standard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:28:27.191045046 CET192.168.2.41.1.1.10xcce1Standard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:27.191190004 CET192.168.2.41.1.1.10xd99bStandard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:28:37.347878933 CET192.168.2.41.1.1.10xd456Standard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:37.347944021 CET192.168.2.41.1.1.10x3aedStandard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:28:47.501674891 CET192.168.2.41.1.1.10xe3edStandard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:47.501732111 CET192.168.2.41.1.1.10xdcf8Standard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Dec 20, 2024 19:27:54.186234951 CET1.1.1.1192.168.2.40x9a30No error (0)httpbin.org98.85.100.80A (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:27:54.186234951 CET1.1.1.1192.168.2.40x9a30No error (0)httpbin.org34.226.108.155A (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:27:56.839107990 CET1.1.1.1192.168.2.40x1cacName error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:27:56.839149952 CET1.1.1.1192.168.2.40xc0eaName error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:07.019057989 CET1.1.1.1192.168.2.40xa84fName error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:28:07.019130945 CET1.1.1.1192.168.2.40xdd96Name error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:17.171155930 CET1.1.1.1192.168.2.40xb6adName error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:17.171278000 CET1.1.1.1192.168.2.40xfc33Name error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:28:27.328588963 CET1.1.1.1192.168.2.40xd99bName error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:28:27.328651905 CET1.1.1.1192.168.2.40xcce1Name error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:37.487852097 CET1.1.1.1192.168.2.40x3aedName error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:28:37.487871885 CET1.1.1.1192.168.2.40xd456Name error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:47.639816999 CET1.1.1.1192.168.2.40xdcf8Name error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:28:47.640675068 CET1.1.1.1192.168.2.40xe3edName error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      • httpbin.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.44973198.85.100.804437508C:\Users\user\Desktop\Set-up.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-12-20 18:27:56 UTC52OUTGET /ip HTTP/1.1
                                                      Host: httpbin.org
                                                      Accept: */*
                                                      2024-12-20 18:27:56 UTC224INHTTP/1.1 200 OK
                                                      Date: Fri, 20 Dec 2024 18:27:56 GMT
                                                      Content-Type: application/json
                                                      Content-Length: 31
                                                      Connection: close
                                                      Server: gunicorn/19.9.0
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Allow-Credentials: true
                                                      2024-12-20 18:27:56 UTC31INData Raw: 7b 0a 20 20 22 6f 72 69 67 69 6e 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 0a 7d 0a
                                                      Data Ascii: { "origin": "8.46.123.189"}


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:13:27:52
                                                      Start date:20/12/2024
                                                      Path:C:\Users\user\Desktop\Set-up.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Set-up.exe"
                                                      Imagebase:0x900000
                                                      File size:7'894'016 bytes
                                                      MD5 hash:CF434586B9C7BE034528E12C545E0718
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:13:28:56
                                                      Start date:20/12/2024
                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7508 -s 736
                                                      Imagebase:0x7a0000
                                                      File size:483'680 bytes
                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      No disassembly